<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
	xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
	xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
	xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus OVAL Generator</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2013-06-12T05:02:06</oval:timestamp>
  </generator>
  <definitions>
<definition id="oval:org.opensuse.security:def:20040801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0801</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2004-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0801" source="CVE"/>
	<description>
	Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
	</description>
 </metadata>
<!-- 1fc35457f44c900b3d8fd5c9f5e55767 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070058" comment="hplip-hpijs less than 3.10.2-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070059" comment="hplip less than 3.10.2-2.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4890</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2005-4890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4890" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 8ffe03565bbc4a6c933885d65b941a7f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072291" comment="coreutils-lang less than 7.1-11.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072292" comment="coreutils less than 7.1-11.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7246</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2006-7246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7246" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 66647939795d2cce332db38a214c13fe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071992" comment="NetworkManager-devel less than 0.8-8.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071993" comment="NetworkManager-doc less than 0.8-8.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071994" comment="NetworkManager-glib less than 0.8-8.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071995" comment="NetworkManager-gnome less than 0.8-6.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071996" comment="NetworkManager less than 0.8-8.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071997" comment="wpa_supplicant-gui less than 0.7.1-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071998" comment="wpa_supplicant less than 0.7.1-5.3.1"/>
		</criteria>
	</criteria>
	<!-- bfcdf8c74088567d16100060f06dd9bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072648" comment="NetworkManager-gnome less than 0.8-6.7.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4776</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2008-4776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776" source="CVE"/>
	<description>
	libgadu before 1.8.2 allows remote servers to cause a denial of service (crash) via a contact description with a large length, which triggers a buffer over-read.
	</description>
 </metadata>
<!-- 357c1007d40041294a58bb9f84348aab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065205" comment="kdenetwork4-filesharing less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065206" comment="kdenetwork4 less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065207" comment="kdnssd less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065208" comment="kget less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065209" comment="kopete-devel less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065210" comment="kopete less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065211" comment="kppp less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065212" comment="krdc less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065213" comment="krfb less than 4.4.4-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2008-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
	<description>
	OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
	</description>
 </metadata>
<!-- 3878cb127b380ae388db535838afb9e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069568" comment="compat-openssl097g-32bit less than 0.9.7g-155.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069569" comment="compat-openssl097g less than 0.9.7g-155.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6218</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2008-6218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6218" source="CVE"/>
	<description>
	Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3e1a79e075c3043f0af222bdae8a9d1d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069815" comment="libpng12-0-32bit less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069816" comment="libpng12-0 less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069817" comment="libpng12-compat-devel less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069818" comment="libpng12-devel less than 1.2.46-7.3.1"/>
		</criteria>
	</criteria>
	<!-- e9885661bc23c9505c7d46637e89a85d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069819" comment="libpng14-14-32bit less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069820" comment="libpng14-14 less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069821" comment="libpng14-compat-devel less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069822" comment="libpng14-devel less than 1.4.3-3.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
	<description>
	The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
	</description>
 </metadata>
<!-- 3878cb127b380ae388db535838afb9e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069568" comment="compat-openssl097g-32bit less than 0.9.7g-155.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069569" comment="compat-openssl097g less than 0.9.7g-155.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
	<description>
	OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
	</description>
 </metadata>
<!-- 3878cb127b380ae388db535838afb9e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069568" comment="compat-openssl097g-32bit less than 0.9.7g-155.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069569" comment="compat-openssl097g less than 0.9.7g-155.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0945</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-0945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945" source="CVE"/>
	<description>
	Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1681</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1681" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not prevent web sites from loading third-party content into a subframe, which allows remote attackers to bypass the Same Origin Policy and conduct "clickjacking" attacks via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1684</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1684" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via an event handler that triggers script execution in the context of the next loaded document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1685</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1685" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML by overwriting the document.implementation property of (1) an embedded document or (2) a parent document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1686</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1686" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle constant (aka const) declarations in a type-conversion operation during JavaScript exception handling, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1687</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1687" source="CVE"/>
	<description>
	The JavaScript garbage collector in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle allocation failures, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document that triggers write access to an "offset of a NULL pointer."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1688</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1688" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to determining a security context through an approach that is not the "HTML 5 standard method."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1689</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1689" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving submission of a form to the about:blank URL, leading to security-context replacement.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1690</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1690" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to "recursion in certain DOM event handlers."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1691</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1691" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to insufficient access control for standard JavaScript prototypes in other domains.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1692</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1692" source="CVE"/>
	<description>
	WebKit before r41741, as used in Apple iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Safari, and other software, allows remote attackers to cause a denial of service (memory consumption or device reset) via a web page containing an HTMLSelectElement object with a large length attribute, related to the length property of a Select object.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1693</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1693" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to read images from arbitrary web sites via a CANVAS element with an SVG image, related to a "cross-site image capture issue."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1694</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1694" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle redirects, which allows remote attackers to read images from arbitrary web sites via vectors involving a CANVAS element and redirection, related to a "cross-site image capture issue."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1695</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1695" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving access to frame contents after completion of a page transition.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1696</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1696" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 uses predictable random numbers in JavaScript applications, which makes it easier for remote web servers to track the behavior of a Safari user during a session.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1697</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1697" source="CVE"/>
	<description>
	CRLF injection vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject HTTP headers and bypass the Same Origin Policy via a crafted HTML document, related to cross-site scripting (XSS) attacks that depend on communication with arbitrary web sites on the same server through use of XMLHttpRequest without a Host header.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1698</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1698" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1699</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1699" source="CVE"/>
	<description>
	The XSL stylesheet implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle XML external entities, which allows remote attackers to read arbitrary files via a crafted DTD, as demonstrated by a file:///etc/passwd URL in an entity declaration, related to an "XXE attack."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1700</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1700" source="CVE"/>
	<description>
	The XSLT implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle redirects, which allows remote attackers to read XML content from arbitrary web pages via a crafted document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1701</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1701" source="CVE"/>
	<description>
	Use-after-free vulnerability in the JavaScript DOM implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by destroying a document.body element that has an unspecified XML container with elements that support the dir attribute.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1702</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1702" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to improper handling of Location and History objects.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1703</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1703" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0 does not prevent references to file: URLs within (1) audio and (2) video elements, which allows remote attackers to determine the existence of arbitrary files via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1709</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1709" source="CVE"/>
	<description>
	Use-after-free vulnerability in the garbage-collection implementation in WebCore in WebKit in Apple Safari before 4.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption and application crash) via an SVG animation element, related to SVG set objects, SVG marker elements, the targetElement attribute, and unspecified "caches."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1710</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1710" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0 allows remote attackers to spoof the browser's display of (1) the host name, (2) security indicators, and unspecified other UI elements via a custom cursor in conjunction with a modified CSS3 hotspot property.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1711</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1711" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0 does not properly initialize memory for Attr DOM objects, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1712</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1712" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0 does not prevent remote loading of local Java applets, which allows remote attackers to execute arbitrary code, gain privileges, or obtain sensitive information via an APPLET or OBJECT element.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1713</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1713" source="CVE"/>
	<description>
	The XSLT functionality in WebKit in Apple Safari before 4.0 does not properly implement the document function, which allows remote attackers to read (1) arbitrary local files and (2) files from different security zones via unspecified vectors.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1714</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1714" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Web Inspector in WebKit in Apple Safari before 4.0 allows user-assisted remote attackers to inject arbitrary web script or HTML, and read local files, via vectors related to the improper escaping of HTML attributes.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1715</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1715" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Web Inspector in WebKit in Apple Safari before 4.0 allows user-assisted remote attackers to inject arbitrary web script or HTML, and read local files, via vectors related to script execution with incorrect privileges.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1718</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1718" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0 allows user-assisted remote attackers to obtain sensitive information via vectors involving drag events and the dragging of content over a crafted web page.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1724</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1724" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms, allows remote attackers to inject arbitrary web script or HTML via vectors related to parent and top objects.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1725</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1725" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2195</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2195" source="CVE"/>
	<description>
	Buffer overflow in WebKit in Apple Safari before 4.0.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted floating-point numbers.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2199</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2199" source="CVE"/>
	<description>
	Incomplete blacklist vulnerability in WebKit in Apple Safari before 4.0.3, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms, allows remote attackers to spoof domain names in URLs, and possibly conduct phishing attacks, via unspecified homoglyphs.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2200</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2200" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0.3 does not properly restrict the URL scheme of the pluginspage attribute of an EMBED element, which allows user-assisted remote attackers to launch arbitrary file: URLs and obtain sensitive information via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2419</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2419" source="CVE"/>
	<description>
	Use-after-free vulnerability in the servePendingRequests function in WebCore in WebKit in Apple Safari 4.0 and 4.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted HTML document that references a zero-length .js file and the JavaScript reload function.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2797</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2797" source="CVE"/>
	<description>
	The WebKit component in Safari in Apple iPhone OS before 3.1, and iPhone OS before 3.1.1 for iPod touch, does not remove usernames and passwords from URLs sent in Referer headers, which allows remote attackers to obtain sensitive information by reading Referer logs on a web server.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2816</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2816" source="CVE"/>
	<description>
	The implementation of Cross-Origin Resource Sharing (CORS) in WebKit, as used in Apple Safari before 4.0.4 and Google Chrome before 3.0.195.33, includes certain custom HTTP headers in the OPTIONS request during cross-origin operations with preflight, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web page.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2841</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-2841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2841" source="CVE"/>
	<description>
	The HTMLMediaElement::loadResource function in html/HTMLMediaElement.cpp in WebCore in WebKit before r49480, as used in Apple Safari before 4.0.4 on Mac OS X, does not perform the expected callbacks for HTML 5 media elements that have external URLs for media resources, which allows remote attackers to trigger sub-resource requests to arbitrary web sites via a crafted HTML document, as demonstrated by an HTML e-mail message that uses a media element for X-Confirm-Reading-To functionality, aka rdar problem 7271202.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3272</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3272" source="CVE"/>
	<description>
	Stack consumption vulnerability in WebKit.dll in WebKit in Apple Safari 3.2.3, and possibly other versions before 4.1.2, allows remote attackers to cause a denial of service (application crash) via JavaScript code that calls eval on a long string composed of A/ sequences.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3384</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3384" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in WebKit in Apple Safari before 4.0.4 on Windows allow remote FTP servers to execute arbitrary code, cause a denial of service (application crash), or obtain sensitive information via a crafted directory listing in a reply.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
	<description>
	The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 3878cb127b380ae388db535838afb9e6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069568" comment="compat-openssl097g-32bit less than 0.9.7g-155.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069569" comment="compat-openssl097g less than 0.9.7g-155.3.1"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
	<!-- 82c4031c81a758c77487c1355139d333 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064838" comment="gnutls less than 2.8.6-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064839" comment="libgnutls-devel less than 2.8.6-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064840" comment="libgnutls-extra-devel less than 2.8.6-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064841" comment="libgnutls-extra26 less than 2.8.6-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064842" comment="libgnutls26-32bit less than 2.8.6-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064843" comment="libgnutls26 less than 2.8.6-2.3.1"/>
		</criteria>
	</criteria>
	<!-- ee93b41dfd42ae8beca8d221b037f87c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065294" comment="gnutls less than 2.8.6-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065295" comment="libgnutls-devel less than 2.8.6-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065296" comment="libgnutls-extra-devel less than 2.8.6-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065297" comment="libgnutls-extra26 less than 2.8.6-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065298" comment="libgnutls26-32bit less than 2.8.6-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065299" comment="libgnutls26 less than 2.8.6-2.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3700</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3700" source="CVE"/>
	<description>
	Buffer overflow in sgLog.c in squidGuard 1.3 and 1.4 allows remote attackers to cause a denial of service (application hang or loss of blocking functionality) via a long URL with many / (slash) characters, related to "emergency mode."
	</description>
 </metadata>
<!-- c30e2f232540b7b0f16d2c8fb4973c36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061909" comment="squidGuard-doc less than 1.4-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061910" comment="squidGuard less than 1.4-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3826</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3826" source="CVE"/>
	<description>
	Multiple buffer overflows in squidGuard 1.4 allow remote attackers to bypass intended URL blocking via a long URL, related to (1) the relationship between a certain buffer size in squidGuard and a certain buffer size in Squid and (2) a redirect URL that contains information about the originally requested URL.
	</description>
 </metadata>
<!-- c30e2f232540b7b0f16d2c8fb4973c36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061909" comment="squidGuard-doc less than 1.4-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061910" comment="squidGuard less than 1.4-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3933</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3933" source="CVE"/>
	<description>
	WebKit before r50173, as used in Google Chrome before 3.0.195.32, allows remote attackers to cause a denial of service (CPU consumption) via a web page that calls the JavaScript setInterval method, which triggers an incompatibility between the WTF::currentTime and base::Time functions.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3934</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-3934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3934" source="CVE"/>
	<description>
	The WebFrameLoaderClient::dispatchDidChangeLocationWithinPage function in src/webkit/glue/webframeloaderclient_impl.cc in Google Chrome before 3.0.195.32 allows user-assisted remote attackers to cause a denial of service via a page-local link, related to an "empty redirect chain," as demonstrated by a message in Yahoo! Mail.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4835</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-4835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4835" source="CVE"/>
	<description>
	The (1) htk_read_header, (2) alaw_init, (3) ulaw_init, (4) pcm_init, (5) float32_init, and (6) sds_read_header functions in libsndfile 1.0.20 allow context-dependent attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted audio file.
	</description>
 </metadata>
<!-- 0a3778d99694a2946c6bcab5bbdcfbf5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069634" comment="libsndfile-32bit less than 1.0.20-8.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069635" comment="libsndfile-devel less than 1.0.20-8.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069636" comment="libsndfile less than 1.0.20-8.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4901</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-4901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4901" source="CVE"/>
	<description>
	The MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 might allow local users to cause a denial of service (daemon crash) via crafted SCARD_SET_ATTRIB message data, which is improperly demarshalled and triggers a buffer over-read, a related issue to CVE-2010-0407.
	</description>
 </metadata>
<!-- 91e981205071a429636674d340b07e59 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061979" comment="libpcsclite1-32bit less than 1.5.5-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061980" comment="libpcsclite1 less than 1.5.5-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061981" comment="pcsc-lite-devel less than 1.5.5-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061982" comment="pcsc-lite less than 1.5.5-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4902</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-4902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4902" source="CVE"/>
	<description>
	Buffer overflow in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite 1.5.4 and earlier might allow local users to gain privileges via crafted SCARD_CONTROL message data, which is improperly demarshalled.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0407.
	</description>
 </metadata>
<!-- 91e981205071a429636674d340b07e59 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061979" comment="libpcsclite1-32bit less than 1.5.5-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061980" comment="libpcsclite1 less than 1.5.5-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061981" comment="pcsc-lite-devel less than 1.5.5-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061982" comment="pcsc-lite less than 1.5.5-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5022</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-5022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5022" source="CVE"/>
	<description>
	Heap-based buffer overflow in tif_ojpeg.c in the OJPEG decoder in LibTIFF before 3.9.5 allows remote attackers to execute arbitrary code via a crafted TIFF file.
	</description>
 </metadata>
<!-- ecaa46248db2007ccc9934afefdef3f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067965" comment="libtiff-devel-32bit less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067966" comment="libtiff-devel less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067967" comment="libtiff3-32bit less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067968" comment="libtiff3 less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067969" comment="tiff less than 3.9.2-5.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5023</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-5023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5023" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- a1f4b15033c7ae9119c7dece39e34138 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071562" comment="fail2ban less than 0.8.4-5.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5024</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-5024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5024" source="CVE"/>
	<description>
	ViewVC before 1.1.11 allows remote attackers to bypass the cvsdb row_limit configuration setting, and consequently conduct resource-consumption attacks, via the limit parameter, as demonstrated by a "query revision history" request.
	</description>
 </metadata>
<!-- 65e89e5e59969db3315995463ea1b354 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068545" comment="viewvc less than 1.1.11-1.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5029</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029" source="CVE"/>
	<description>
	Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
	</description>
 </metadata>
<!-- 2d651a058870c871a2ac7cf12ccfcd12 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072403" comment="glibc-32bit less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072404" comment="glibc-devel-32bit less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072405" comment="glibc-devel less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072406" comment="glibc-html less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072407" comment="glibc-i18ndata less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072408" comment="glibc-info less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072409" comment="glibc-locale-32bit less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072410" comment="glibc-locale less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072411" comment="glibc-obsolete less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072412" comment="glibc-profile-32bit less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072413" comment="glibc-profile less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072414" comment="glibc less than 2.11.2-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072415" comment="nscd less than 2.11.2-3.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5063</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-5063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5063" source="CVE"/>
	<description>
	Memory leak in the embedded_profile_len function in pngwutil.c in libpng before 1.2.39beta5 allows context-dependent attackers to cause a denial of service (memory leak or segmentation fault) via a JPEG image containing an iCCP chunk with a negative embedded profile length.  NOTE: this is due to an incomplete fix for CVE-2006-7244.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3e1a79e075c3043f0af222bdae8a9d1d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069815" comment="libpng12-0-32bit less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069816" comment="libpng12-0 less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069817" comment="libpng12-compat-devel less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069818" comment="libpng12-devel less than 1.2.46-7.3.1"/>
		</criteria>
	</criteria>
	<!-- e9885661bc23c9505c7d46637e89a85d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069819" comment="libpng14-14-32bit less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069820" comment="libpng14-14 less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069821" comment="libpng14-compat-devel less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069822" comment="libpng14-devel less than 1.4.3-3.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5065</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2009-5065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5065" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0 allows remote attackers to inject arbitrary web script or HTML via vectors involving nested CDATA stanzas.
	</description>
 </metadata>
<!-- a1c2bff8830482988670093dc6b9a18a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067027" comment="python-feedparser less than 4.1-6.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0046</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0046" source="CVE"/>
	<description>
	The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted format arguments.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0047</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0047" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to "HTML object element fallback content."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0048</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0048" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted XML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0049</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0049" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via HTML elements with right-to-left (RTL) text directionality.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0050</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0050" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an HTML document with improperly nested tags.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0051</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0051" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0.5 does not properly validate the cross-origin loading of stylesheets, which allows remote attackers to obtain sensitive information via a crafted HTML document.  NOTE: this might overlap CVE-2010-0651.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0052</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0052" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to "callbacks for HTML elements."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0053</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0053" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the run-in Cascading Style Sheets (CSS) display property.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0054</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0054" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving HTML IMG elements.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0179</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0179" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0209</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0209" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2213, CVE-2010-2214, and CVE-2010-2216.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062178" comment="acroread less than 9.3.4-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0213</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0213" source="CVE"/>
	<description>
	BIND 9.7.1 and 9.7.1-P1, when a recursive validating server has a trust anchor that is configured statically or via DNSSEC Lookaside Validation (DLV), allows remote attackers to cause a denial of service (infinite loop) via a query for an RRSIG record whose answer is not in the cache, which causes BIND to repeatedly send RRSIG queries to the authoritative servers.
	</description>
 </metadata>
<!-- 42243e0a2dbacd45b6d85425a9ea6b0b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064075" comment="bind-chrootenv less than 9.7.1P2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064076" comment="bind-devel less than 9.7.1P2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064077" comment="bind-doc less than 9.7.1P2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064078" comment="bind-libs-32bit less than 9.7.1P2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064079" comment="bind-libs less than 9.7.1P2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064080" comment="bind-utils less than 9.7.1P2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064081" comment="bind less than 9.7.1P2-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0315</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0315" source="CVE"/>
	<description>
	WebKit before r53607, as used in Google Chrome before 4.0.249.89, allows remote attackers to discover a redirect's target URL, for the session of a specific user of a web site, by placing the site's URL in the HREF attribute of a stylesheet LINK element, and then reading the document.styleSheets[0].href property value, related to an IFRAME element.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0397</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0397" source="CVE"/>
	<description>
	The xmlrpc extension in PHP 5.3.1 does not properly handle a missing methodName element in the first argument to the xmlrpc_decode_request function, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly have unspecified other impact via a crafted argument.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
	<description>
	Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
	</description>
 </metadata>
<!-- e407d6748749e6e6024e5bb37c13be0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063217" comment="bzip2-doc less than 1.0.5-39.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063218" comment="bzip2 less than 1.0.5-39.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063219" comment="libbz2-1-32bit less than 1.0.5-39.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063220" comment="libbz2-1 less than 1.0.5-39.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063221" comment="libbz2-devel less than 1.0.5-39.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0407</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0407" source="CVE"/>
	<description>
	Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
	</description>
 </metadata>
<!-- 91e981205071a429636674d340b07e59 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061979" comment="libpcsclite1-32bit less than 1.5.5-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061980" comment="libpcsclite1 less than 1.5.5-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061981" comment="pcsc-lite-devel less than 1.5.5-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061982" comment="pcsc-lite less than 1.5.5-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0435</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0435" source="CVE"/>
	<description>
	The Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2, and KVM 83, when the Intel VT-x extension is enabled, allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via vectors related to instruction emulation.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0541</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0541" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.
	</description>
 </metadata>
<!-- f055e48d182b6f7f608cb8ff6aeb2fde -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068621" comment="ruby-devel less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068622" comment="ruby-doc-html less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068623" comment="ruby-doc-ri less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068624" comment="ruby-examples less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068625" comment="ruby-test-suite less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068626" comment="ruby-tk less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068627" comment="ruby less than 1.8.7.p249-8.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0542</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542" source="CVE"/>
	<description>
	The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.
	</description>
 </metadata>
<!-- b9517c6deeb9b6fb02cdb512c1c8745c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064799" comment="cups-client less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064800" comment="cups-ddk less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064801" comment="cups-devel less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064802" comment="cups-libs-32bit less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064803" comment="cups-libs less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064804" comment="cups less than 1.4.4-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0639</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0639" source="CVE"/>
	<description>
	The htcpHandleTstRequest function in htcp.c in Squid 2.x before 2.6.STABLE24 and 2.7 before 2.7.STABLE8, and htcp.cc in 3.0 before 3.0.STABLE24, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets to the HTCP port.
	</description>
 </metadata>
<!-- 746ecc89595fb232d7eccaacc56ee988 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072649" comment="squid less than 2.7.STABLE6-7.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0647</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0647" source="CVE"/>
	<description>
	WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a &lt;ruby&gt;&gt;&lt;table&gt;&lt;rt&gt; sequence.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0650</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0650" source="CVE"/>
	<description>
	WebKit, as used in Google Chrome before 4.0.249.78 and Apple Safari, allows remote attackers to bypass intended restrictions on popup windows via crafted use of a mouse click event.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0651</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0651" source="CVE"/>
	<description>
	WebKit before r52784, as used in Google Chrome before 4.0.249.78 and Apple Safari before 4.0.5, permits cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0653</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0653" source="CVE"/>
	<description>
	Opera before 10.10 permits cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
	</description>
 </metadata>
<!-- 55bf85f01cfa819337a5ac07ceb6416e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061279" comment="opera less than 10.60-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0654</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0654" source="CVE"/>
	<description>
	Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 permit cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a618f6f1ba6d2380c7bf23f8cdfbbd8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061798" comment="MozillaThunderbird-devel less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061799" comment="MozillaThunderbird-translations-common less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061800" comment="MozillaThunderbird-translations-other less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061801" comment="MozillaThunderbird less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061805" comment="enigmail less than 1.0.1-3.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0656</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0656" source="CVE"/>
	<description>
	WebKit before r51295, as used in Google Chrome before 4.0.249.78, presents a directory-listing page in response to an XMLHttpRequest for a file:/// URL that corresponds to a directory, which allows attackers to obtain sensitive information or possibly have unspecified other impact via a crafted local HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0659</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0659" source="CVE"/>
	<description>
	The image decoder in WebKit before r52833, as used in Google Chrome before 4.0.249.78, does not properly handle a failure of memory allocation, which allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed GIF file that specifies a large size.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0661</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0661" source="CVE"/>
	<description>
	WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp in WebKit before r52401, as used in Google Chrome before 4.0.249.78, allows remote attackers to bypass the Same Origin Policy via vectors involving the window.open method.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0743</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0743" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) 1.0.3, 0.9.5, and earlier and (2) iSCSI Enterprise Target (aka iscsitarget) 0.4.16 allow remote attackers to cause a denial of service (tgtd daemon crash) or possibly have unspecified other impact via vectors that involve the isns_attr_query and qry_rsp_handle functions, and are related to (a) client appearance and (b) client disappearance messages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4db9a1c6f547129a7ba0b581d6254caa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062558" comment="iscsitarget-kmp-default less than 1.4.19_k2.6.34.0_12-4.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062559" comment="iscsitarget-kmp-desktop less than 1.4.19_k2.6.34.0_12-4.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062560" comment="iscsitarget-kmp-pae less than 1.4.19_k2.6.34.0_12-4.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062561" comment="iscsitarget-kmp-xen less than 1.4.19_k2.6.34.0_12-4.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062562" comment="iscsitarget less than 1.4.19-4.1.1"/>
		</criteria>
	</criteria>
	<!-- 9b74cdb843432feb8f09b3e35de01b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062563" comment="tgt less than 0.9.0-7.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1000</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1000" source="CVE"/>
	<description>
	Directory traversal vulnerability in KGet in KDE SC 4.0.0 through 4.4.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
	</description>
 </metadata>
<!-- 357c1007d40041294a58bb9f84348aab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065205" comment="kdenetwork4-filesharing less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065206" comment="kdenetwork4 less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065207" comment="kdnssd less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065208" comment="kget less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065209" comment="kopete-devel less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065210" comment="kopete less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065211" comment="kppp less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065212" comment="krdc less than 4.4.4-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065213" comment="krfb less than 4.4.4-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1029</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1029" source="CVE"/>
	<description>
	Stack consumption vulnerability in the WebCore::CSSSelector function in WebKit, as used in Apple Safari 4.0.4, Apple Safari on iPhone OS and iPhone OS for iPod touch, and Google Chrome 4.0.249, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a STYLE element composed of a large number of *&gt; sequences.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1126</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1126" source="CVE"/>
	<description>
	The JavaScript implementation in WebKit allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1157</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1157" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.
	</description>
 </metadata>
<!-- bb5b71fd7148a30e8daa6e27f0034bd5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062664" comment="tomcat6-admin-webapps less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062665" comment="tomcat6-docs-webapp less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062666" comment="tomcat6-el-1_0-api less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062667" comment="tomcat6-javadoc less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062668" comment="tomcat6-jsp-2_1-api less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062669" comment="tomcat6-lib less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062670" comment="tomcat6-servlet-2_5-api less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062671" comment="tomcat6-webapps less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062672" comment="tomcat6 less than 6.0.24-5.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1163</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163" source="CVE"/>
	<description>
	The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
	</description>
 </metadata>
<!-- b05a056023e5bcac49ebdc63eaaf47c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065550" comment="sudo less than 1.7.2p7-2.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1166</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1166" source="CVE"/>
	<description>
	The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
	</description>
 </metadata>
<!-- 9c8b6da4223930544129699c2400e196 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062179" comment="xorg-x11-Xvnc less than 7.5_1.8.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062180" comment="xorg-x11-server-extra less than 7.5_1.8.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062181" comment="xorg-x11-server-sdk less than 7.5_1.8.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062182" comment="xorg-x11-server less than 7.5_1.8.0-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1172</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1172" source="CVE"/>
	<description>
	DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Power, (2) NetworkManager, and (3) ModemManager services.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2e72ada925fdd0e351ba60bf02b6d29c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067028" comment="NetworkManager-devel less than 0.8-8.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067029" comment="NetworkManager-doc less than 0.8-8.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067030" comment="NetworkManager-glib less than 0.8-8.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067031" comment="NetworkManager less than 0.8-8.2.3"/>
		</criteria>
	</criteria>
	<!-- 4a5883293b78b42ebc7b7e7b8e0c1eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064445" comment="gdm-branding-upstream less than 2.30.2-6.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064446" comment="gdm-lang less than 2.30.2-6.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064447" comment="gdm less than 2.30.2-6.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064448" comment="gnome-applets-gdm less than 2.30.2-6.1.1"/>
		</criteria>
	</criteria>
	<!-- 5a790e6448f5df8668d64d463dc93348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066963" comment="dbus-1-glib-32bit less than 0.86-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066964" comment="dbus-1-glib-devel less than 0.86-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066965" comment="dbus-1-glib-doc less than 0.86-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066966" comment="dbus-1-glib less than 0.86-2.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
	<description>
	Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a618f6f1ba6d2380c7bf23f8cdfbbd8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061798" comment="MozillaThunderbird-devel less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061799" comment="MozillaThunderbird-translations-common less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061800" comment="MozillaThunderbird-translations-other less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061801" comment="MozillaThunderbird less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061805" comment="enigmail less than 1.0.1-3.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1206</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1206" source="CVE"/>
	<description>
	The startDocumentLoad function in browser/base/content/browser.js in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, does not properly implement the Same Origin Policy in certain circumstances related to the about:blank document and a document that is currently loading, which allows (1) remote web servers to conduct spoofing attacks via vectors involving a 204 (aka No Content) status code, and allows (2) remote attackers to conduct spoofing attacks via vectors involving a window.stop call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1207</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1207" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 do not properly implement read restrictions for CANVAS elements, which allows remote attackers to obtain sensitive cross-origin information via vectors involving reference retention and node deletion.
	</description>
 </metadata>
<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1208</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1208" source="CVE"/>
	<description>
	Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1209</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1209" source="CVE"/>
	<description>
	Use-after-free vulnerability in the NodeIterator implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via a crafted NodeFilter that detaches DOM nodes, related to the NodeIterator interface and a javascript callback.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1210</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1210" source="CVE"/>
	<description>
	intl/uconv/util/nsUnicodeDecodeHelper.cpp in Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 inserts a U+FFFD sequence into text in certain circumstances involving undefined positions, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted 8-bit text.
	</description>
 </metadata>
<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1211</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1211" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a618f6f1ba6d2380c7bf23f8cdfbbd8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061798" comment="MozillaThunderbird-devel less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061799" comment="MozillaThunderbird-translations-common less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061800" comment="MozillaThunderbird-translations-other less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061801" comment="MozillaThunderbird less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061805" comment="enigmail less than 1.0.1-3.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1212</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1212" source="CVE"/>
	<description>
	js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) propagation of deep aborts in the TraceRecorder::record_JSOP_BINDNAME function, (2) depth handling in the TraceRecorder::record_JSOP_GETELEM function, and (3) tracing of out-of-range arguments in the TraceRecorder::record_JSOP_ARGSUB function.
	</description>
 </metadata>
<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1213</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1213" source="CVE"/>
	<description>
	The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a618f6f1ba6d2380c7bf23f8cdfbbd8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061798" comment="MozillaThunderbird-devel less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061799" comment="MozillaThunderbird-translations-common less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061800" comment="MozillaThunderbird-translations-other less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061801" comment="MozillaThunderbird less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061805" comment="enigmail less than 1.0.1-3.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1214</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1214" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1215</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1215" source="CVE"/>
	<description>
	Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."
	</description>
 </metadata>
<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1233</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1233" source="CVE"/>
	<description>
	Multiple integer overflows in Google Chrome before 4.1.249.1036 allow remote attackers to have an unspecified impact via vectors involving WebKit JavaScript objects.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1236</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1236" source="CVE"/>
	<description>
	The protocolIs function in platform/KURLGoogle.cpp in WebCore in WebKit before r55822, as used in Google Chrome before 4.1.249.1036 and Flock Browser 3.x before 3.0.0.4112, does not properly handle whitespace at the beginning of a URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted javascript: URL, as demonstrated by a \x00javascript:alert sequence.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1240</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1240" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, do not restrict the contents of one text field in the Launch File warning dialog, which makes it easier for remote attackers to trick users into executing an arbitrary local program that was specified in a PDF document, as demonstrated by a text field that claims that the Open button will enable the user to read an encrypted message.
	</description>
 </metadata>
<!-- cf42df06792fbc140654995f11bbcd1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062178" comment="acroread less than 9.3.4-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
	<description>
	The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1322</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322" source="CVE"/>
	<description>
	The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client.
	</description>
 </metadata>
<!-- 933b6bd9dda9e3282b8213e42081c079 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063406" comment="krb5-32bit less than 1.8.1-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063407" comment="krb5-client less than 1.8.1-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063408" comment="krb5-devel-32bit less than 1.8.1-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063409" comment="krb5-devel less than 1.8.1-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063410" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063411" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063412" comment="krb5-server less than 1.8.1-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063413" comment="krb5 less than 1.8.1-5.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1323</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
	</description>
 </metadata>
<!-- c8c28ea32e843131e4622c708eb77d1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065105" comment="krb5-32bit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065106" comment="krb5-client less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065107" comment="krb5-devel-32bit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065108" comment="krb5-devel less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065109" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065110" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065111" comment="krb5-server less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065112" comment="krb5 less than 1.8.1-5.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1324</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
	</description>
 </metadata>
<!-- c8c28ea32e843131e4622c708eb77d1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065105" comment="krb5-32bit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065106" comment="krb5-client less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065107" comment="krb5-devel-32bit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065108" comment="krb5-devel less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065109" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065110" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065111" comment="krb5-server less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065112" comment="krb5 less than 1.8.1-5.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1386</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1386" source="CVE"/>
	<description>
	page/Geolocation.cpp in WebCore in WebKit before r56188 and before 1.2.5 does not properly restrict access to the lastPosition function, which has unspecified impact and remote attack vectors, aka rdar problem 7746357.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1387</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1387" source="CVE"/>
	<description>
	Use-after-free vulnerability in JavaScriptCore in WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page transitions, a different vulnerability than CVE-2010-1763 and CVE-2010-1769.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1388</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1388" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6, and before 4.1 on Mac OS X 10.4, does not properly handle clipboard (1) drag and (2) paste operations for URLs, which allows user-assisted remote attackers to read arbitrary files via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1389</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1389" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows user-assisted remote attackers to inject arbitrary web script or HTML via vectors involving a (1) paste or (2) drag-and-drop operation for a selection.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1390</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1390" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via vectors related to improper UTF-7 canonicalization, and lack of termination of a quoted string in an HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1391</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1391" source="CVE"/>
	<description>
	Multiple directory traversal vulnerabilities in the (a) Local Storage and (b) Web SQL database implementations in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allow remote attackers to create arbitrary database files via vectors involving a (1) %2f and .. (dot dot) or (2) %5c and .. (dot dot) in a URL.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1392</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1392" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to HTML buttons and the first-letter CSS style.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1393</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1393" source="CVE"/>
	<description>
	The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to discover sensitive URLs via an HREF attribute associated with a redirecting URL.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1394</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1394" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via vectors involving HTML document fragments.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1395</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1395" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via vectors involving DOM constructor objects, related to a "scope management issue."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1396</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1396" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the contentEditable attribute and removing container elements.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1397</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1397" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to a layout change during selection rendering and the DOCUMENT_POSITION_DISCONNECTED attribute in a container of an unspecified type.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1398</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1398" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not properly perform ordered list insertions, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document, related to the insertion of an unspecified element into an editable container and the access of an uninitialized element.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1399</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1399" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, accesses uninitialized memory during a selection change on a form input element, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1400</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1400" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving caption elements.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1401</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1401" source="CVE"/>
	<description>
	Use-after-free vulnerability in the Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving the :first-letter pseudo-element.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1402</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1402" source="CVE"/>
	<description>
	Double free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to an event listener in an SVG document, related to duplicate event listeners, a timer, and an AnimateTransform object.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1403</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1403" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, accesses uninitialized memory during the handling of a use element in an SVG document, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted document containing XML that triggers a parsing error, related to ProcessInstruction.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1404</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1404" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an SVG document that contains recursive Use elements, which are not properly handled during page deconstruction.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1405</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1405" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an HTML element that has custom vertical positioning.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1406</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1406" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, sends an https URL in the Referer header of an http request in certain circumstances involving https to http redirection, which allows remote HTTP servers to obtain potentially sensitive information via standard HTTP logging, a related issue to CVE-2010-0660.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1407</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1407" source="CVE"/>
	<description>
	WebKit in Apple iOS before 4 on the iPhone and iPod touch does not properly implement the history.replaceState method in certain situations involving IFRAME elements, which allows remote attackers to obtain sensitive information via a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1408</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1408" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to bypass intended restrictions on outbound connections to "non-default TCP ports" via a crafted port number, related to an "integer truncation issue." NOTE: this may overlap CVE-2010-1099.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1409</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1409" source="CVE"/>
	<description>
	Incomplete blacklist vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to trigger disclosure of data over IRC via vectors involving an IRC service port.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1410</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1410" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via an SVG document with nested use elements.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1412</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1412" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to hover events.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1413</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1413" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, sends NTLM credentials in cleartext in unspecified circumstances, which allows man-in-the-middle attackers to obtain sensitive information via unspecified vectors.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1414</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1414" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the removeChild DOM method.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1415</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1415" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not properly handle libxml contexts, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, related to an "API abuse issue."
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1416</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1416" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not properly restrict the reading of a canvas that contains an SVG image pattern from a different web site, which allows remote attackers to read images from other sites via a crafted canvas, related to a "cross-site image capture issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1417</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1417" source="CVE"/>
	<description>
	The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via HTML content that contains multiple :after pseudo-selectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1418</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1418" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via a FRAME element with a SRC attribute composed of a javascript: sequence preceded by spaces.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1419</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1419" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows user-assisted remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving a certain window close action that occurs during a drag-and-drop operation.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1421</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1421" source="CVE"/>
	<description>
	The execCommand JavaScript function in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not properly restrict remote execution of clipboard commands, which allows remote attackers to modify the clipboard via a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1422</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1422" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not properly handle changes to keyboard focus that occur during processing of key press events, which allows remote attackers to force arbitrary key presses via a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1455</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455" source="CVE"/>
	<description>
	The DOCSIS dissector in Wireshark 0.9.6 through 1.0.12 and 1.2.0 through 1.2.7 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed packet trace file.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1501</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1501" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-1767.  Reason: This candidate is a duplicate of CVE-2010-1767.  Notes: All CVE users should reference CVE-2010-1767 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1526</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1526" source="CVE"/>
	<description>
	Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.
	</description>
 </metadata>
<!-- 6c3051a4927013b3038e41497d05506d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063150" comment="libgdiplus0 less than 2.6.4-2.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1585</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1585" source="CVE"/>
	<description>
	The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1623</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623" source="CVE"/>
	<description>
	Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
	</description>
 </metadata>
<!-- 79f2b3c814fddec22bbc71334e59bc37 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069596" comment="apache2-devel less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069597" comment="apache2-doc less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069598" comment="apache2-example-certificates less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069599" comment="apache2-example-pages less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069600" comment="apache2-itk less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069601" comment="apache2-prefork less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069602" comment="apache2-utils less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069603" comment="apache2-worker less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069604" comment="apache2 less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069605" comment="libapr-util1-dbd-mysql less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069606" comment="libapr-util1-dbd-pgsql less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069607" comment="libapr-util1-dbd-sqlite3 less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069608" comment="libapr-util1-devel less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069609" comment="libapr-util1 less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069610" comment="libapr1-devel less than 1.3.8-8.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069611" comment="libapr1 less than 1.3.8-8.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1646</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646" source="CVE"/>
	<description>
	The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.
	</description>
 </metadata>
<!-- b05a056023e5bcac49ebdc63eaaf47c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065550" comment="sudo less than 1.7.2p7-2.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1664</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1664" source="CVE"/>
	<description>
	Google Chrome before 4.1.249.1064 does not properly handle HTML5 media, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1665</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1665" source="CVE"/>
	<description>
	Google Chrome before 4.1.249.1064 does not properly handle fonts, which allows remote attackers to cause a denial of service (memory corruption) and possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1674</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1674" source="CVE"/>
	<description>
	The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
	</description>
 </metadata>
<!-- 5354f0c1ce553e93cac1a450d27fd370 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066773" comment="quagga-devel less than 0.99.17-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066774" comment="quagga less than 0.99.17-1.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1675</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1675" source="CVE"/>
	<description>
	bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.
	</description>
 </metadata>
<!-- 5354f0c1ce553e93cac1a450d27fd370 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066773" comment="quagga-devel less than 0.99.17-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066774" comment="quagga less than 0.99.17-1.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1729</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1729" source="CVE"/>
	<description>
	WebKit.dll in WebKit, as used in Safari.exe 4.531.9.1 in Apple Safari, allows remote attackers to cause a denial of service (application crash) via JavaScript that writes &lt;marquee&gt; sequences in an infinite loop.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1748</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748" source="CVE"/>
	<description>
	The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.
	</description>
 </metadata>
<!-- b9517c6deeb9b6fb02cdb512c1c8745c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064799" comment="cups-client less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064800" comment="cups-ddk less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064801" comment="cups-devel less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064802" comment="cups-libs-32bit less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064803" comment="cups-libs less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064804" comment="cups less than 1.4.4-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1749</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1749" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the Cascading Style Sheets (CSS) run-in property and multiple invocations of a destructor for a child element that has been referenced multiple times.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1757</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1757" source="CVE"/>
	<description>
	WebKit in Apple iOS before 4 on the iPhone and iPod touch does not enforce the expected boundary restrictions on content display by an IFRAME element, which allows remote attackers to spoof the user interface via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1758</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1758" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving DOM Range objects.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1759</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1759" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the Node.normalize method.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1760</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1760" source="CVE"/>
	<description>
	loader/DocumentThreadableLoader.cpp in the XMLHttpRequest implementation in WebCore in WebKit before r58409 does not properly handle credentials during a cross-origin synchronous request, which has unspecified impact and remote attack vectors, aka rdar problem 7905150.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1761</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1761" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving HTML document subtrees.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1762</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1762" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via vectors involving HTML in a TEXTAREA element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1763</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1763" source="CVE"/>
	<description>
	Unspecified vulnerability in WebKit in Apple iTunes before 9.2 on Windows has unknown impact and attack vectors, a different vulnerability than CVE-2010-1387 and CVE-2010-1769.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1764</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1764" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, follows multiple redirections during form submission, which allows remote web servers to obtain sensitive information by recording the form data.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1766</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1766" source="CVE"/>
	<description>
	Off-by-one error in the WebSocketHandshake::readServerHandshake function in websockets/WebSocketHandshake.cpp in WebCore in WebKit before r56380, as used in Qt and other products, allows remote websockets servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an upgrade header that is long and invalid.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1767</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1767" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in loader/DocumentThreadableLoader.cpp in WebCore in WebKit before r57041, as used in Google Chrome before 4.1.249.1059, allows remote attackers to hijack the authentication of unspecified victims via a crafted synchronous preflight XMLHttpRequest operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1769</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1769" source="CVE"/>
	<description>
	WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, accesses out-of-bounds memory during the handling of tables, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, a different vulnerability than CVE-2010-1387 and CVE-2010-1763.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1770</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1770" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Apple Safari before 4.1 on Mac OS X 10.4, and Google Chrome before 5.0.375.70 does not properly handle a transformation of a text node that has the IBM1147 character set, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document containing a BR element, related to a "type checking issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1771</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1771" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving fonts.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1772</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1772" source="CVE"/>
	<description>
	Use-after-free vulnerability in page/Geolocation.cpp in WebCore in WebKit before r59859, as used in Google Chrome before 5.0.375.70, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site, related to failure to stop timers associated with geolocation upon deletion of a document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1773</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1773" source="CVE"/>
	<description>
	Off-by-one error in the toAlphabetic function in rendering/RenderListMarker.cpp in WebCore in WebKit before r59950, as used in Google Chrome before 5.0.375.70, allows remote attackers to obtain sensitive information, cause a denial of service (memory corruption and application crash), or possibly execute arbitrary code via vectors related to list markers for HTML lists, aka rdar problem 8009118.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1774</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1774" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, accesses out-of-bounds memory during processing of HTML tables, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14e69d4a0dd51b6a8e6b963f6a9315e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061911" comment="libwebkit-1_0-2-32bit less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061912" comment="libwebkit-1_0-2 less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061913" comment="libwebkit-devel less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061914" comment="libwebkit-lang less than 1.2.3-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061915" comment="webkit-jsc less than 1.2.3-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1780</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1780" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to element focus.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1781</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1781" source="CVE"/>
	<description>
	Double free vulnerability in WebKit in Apple iOS before 4.1 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the rendering of an inline element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1782</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1782" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to the rendering of an inline element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1783</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1783" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; does not properly handle dynamic modification of a text node, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1784</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1784" source="CVE"/>
	<description>
	The counters functionality in the Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1785</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1785" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; accesses uninitialized memory during processing of the (1) :first-letter and (2) :first-line pseudo-elements in an SVG text element, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1786</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1786" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a foreignObject element in an SVG document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1787</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1787" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a floating element in an SVG document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1788</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1788" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a use element in an SVG document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1789</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1789" source="CVE"/>
	<description>
	Heap-based buffer overflow in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a JavaScript string object.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1790</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1790" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; does not properly handle just-in-time (JIT) compiled JavaScript stubs, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, related to a "reentrancy issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1791</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1791" source="CVE"/>
	<description>
	Integer signedness error in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving a JavaScript array index.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1792</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1792" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted regular expression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1793</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1793" source="CVE"/>
	<description>
	Multiple use-after-free vulnerabilities in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4; and webkitgtk before 1.2.6; allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a (1) font-face or (2) use element in an SVG document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1797</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1807</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1807" source="CVE"/>
	<description>
	WebKit in Apple Safari 4.x before 4.1.2 and 5.x before 5.0.2; Android before 2.2; and webkitgtk before 1.2.6; does not properly validate floating-point data, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, related to non-standard NaN representation.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1812</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1812" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple iOS before 4.1 on the iPhone and iPod touch, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving selections.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1813</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1813" source="CVE"/>
	<description>
	WebKit in Apple iOS before 4.1 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors involving HTML object outlines.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1814</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1814" source="CVE"/>
	<description>
	WebKit in Apple iOS before 4.1 on the iPhone and iPod touch, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors involving form menus.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1815</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1815" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple iOS before 4.1 on the iPhone and iPod touch, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving scrollbars.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1822</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1822" source="CVE"/>
	<description>
	WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3 and Google Chrome before 6.0.472.62, does not properly perform a cast of an unspecified variable, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via an SVG element in a non-SVG document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1823</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1823" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit before r65958, as used in Google Chrome before 6.0.472.59, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger use of document APIs such as document.close during parsing, as demonstrated by a Cascading Style Sheets (CSS) file referencing an invalid SVG font, aka rdar problem 8442098.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1824</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1824" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit, as used in Apple iTunes before 10.2 on Windows, Apple Safari, and Google Chrome before 6.0.472.59, allows remote attackers to execute arbitrary code or cause a denial of service via vectors related to SVG styles, the DOM tree, and error messages.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1825</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1825" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit, as used in Google Chrome before 6.0.472.59, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to nested SVG elements.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1860</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1860" source="CVE"/>
	<description>
	The html_entity_decode function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal call, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1862</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1862" source="CVE"/>
	<description>
	The chunk_split function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1864</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1864" source="CVE"/>
	<description>
	The addcslashes function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1866</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1866" source="CVE"/>
	<description>
	The dechunk filter in PHP 5.3 through 5.3.2, when decoding an HTTP chunked encoding stream, allows context-dependent attackers to cause a denial of service (crash) and possibly trigger memory corruption via a negative chunk size, which bypasses a signed comparison, related to an integer overflow in the chunk size decoder.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1914</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1914" source="CVE"/>
	<description>
	The Zend Engine in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information by interrupting the handler for the (1) ZEND_BW_XOR opcode (shift_left_function), (2) ZEND_SL opcode (bitwise_xor_function), or (3) ZEND_SR opcode (shift_right_function), related to the convert_to_long_base function.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1915</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1915" source="CVE"/>
	<description>
	The preg_quote function in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature, modification of ZVALs whose values are not updated in the associated local variables, and access of previously-freed memory.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1917</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1917" source="CVE"/>
	<description>
	Stack consumption vulnerability in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allows context-dependent attackers to cause a denial of service (PHP crash) via a crafted first argument to the fnmatch function, as demonstrated using a long string.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1993</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-1993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1993" source="CVE"/>
	<description>
	Opera 9.52 does not properly handle an IFRAME element with a mailto: URL in its SRC attribute, which allows remote attackers to cause a denial of service (resource consumption) via an HTML document with many IFRAME elements.
	</description>
 </metadata>
<!-- 55bf85f01cfa819337a5ac07ceb6416e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061279" comment="opera less than 10.60-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2023</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2023" source="CVE"/>
	<description>
	transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
	</description>
 </metadata>
<!-- 8daa9a03826aef95669a5b369077f153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061762" comment="exim less than 4.71-4.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061763" comment="eximon less than 4.71-4.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061764" comment="eximstats-html less than 4.71-4.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2024</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2024" source="CVE"/>
	<description>
	transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
	</description>
 </metadata>
<!-- 8daa9a03826aef95669a5b369077f153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061762" comment="exim less than 4.71-4.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061763" comment="eximon less than 4.71-4.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061764" comment="eximstats-html less than 4.71-4.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2055</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2055" source="CVE"/>
	<description>
	Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program.
	</description>
 </metadata>
<!-- 60e7f141ecfa7dfcda71f1c0bf60ce4e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061916" comment="ghostscript-devel less than 8.70-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061917" comment="ghostscript-fonts-other less than 8.70-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061918" comment="ghostscript-fonts-rus less than 8.70-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061919" comment="ghostscript-fonts-std less than 8.70-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061920" comment="ghostscript-ijs-devel less than 8.70-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061921" comment="ghostscript-library less than 8.70-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061922" comment="ghostscript-omni less than 8.70-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061923" comment="ghostscript-x11 less than 8.70-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061924" comment="libgimpprint-devel less than 4.2.7-15.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061925" comment="libgimpprint less than 4.2.7-15.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2067</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2067" source="CVE"/>
	<description>
	Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file.
	</description>
 </metadata>
<!-- d3cfa64ebd32e46b75f3e7ef4499fb62 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061662" comment="tiff less than 3.9.2-5.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2080</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2080" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Open Ticket Request System (OTRS) 2.3.x before 2.3.6 and 2.4.x before 2.4.8 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- 6ae4525d37f89e114dc1e7a02ed8875f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065175" comment="otrs-doc less than 2.4.9-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065176" comment="otrs-itsm less than 2.1.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065177" comment="otrs less than 2.4.9-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2093</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2093" source="CVE"/>
	<description>
	Use-after-free vulnerability in the request shutdown functionality in PHP 5.2 before 5.2.13 and 5.3 before 5.3.2 allows context-dependent attackers to cause a denial of service (crash) via a stream context structure that is freed before destruction occurs.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2094</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2094" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the phar extension in PHP 5.3 before 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the (1) phar_stream_flush, (2) phar_wrapper_unlink, (3) phar_parse_url, or (4) phar_wrapper_open_url functions in ext/phar/stream.c; and the (5) phar_wrapper_open_dir function in ext/phar/dirstream.c, which triggers errors in the php_stream_wrapper_log_error function.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2097</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2097" source="CVE"/>
	<description>
	The (1) iconv_mime_decode, (2) iconv_substr, and (3) iconv_mime_encode functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2100</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2100" source="CVE"/>
	<description>
	The (1) htmlentities, (2) htmlspecialchars, (3) str_getcsv, (4) http_build_query, (5) strpbrk, and (6) strtr functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2101</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2101" source="CVE"/>
	<description>
	The (1) strip_tags, (2) setcookie, (3) strtok, (4) wordwrap, (5) str_word_count, and (6) str_pad functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2188</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2188" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64, and Adobe AIR before 2.0.2.12610, allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by calling the ActionScript native object 2200 connect method multiple times with different arguments, a different vulnerability than CVE-2010-2160, CVE-2010-2165, CVE-2010-2166, CVE-2010-2171, CVE-2010-2175, CVE-2010-2176, CVE-2010-2177, CVE-2010-2178, CVE-2010-2180, CVE-2010-2182, CVE-2010-2184, and CVE-2010-2187.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062178" comment="acroread less than 9.3.4-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2190</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2190" source="CVE"/>
	<description>
	The (1) trim, (2) ltrim, (3) rtrim, and (4) substr_replace functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2191</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2191" source="CVE"/>
	<description>
	The (1) parse_str, (2) preg_match, (3) unpack, and (4) pack functions; the (5) ZEND_FETCH_RW, (6) ZEND_CONCAT, and (7) ZEND_ASSIGN_CONCAT opcodes; and the (8) ArrayObject::uasort method in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) or trigger memory corruption by causing a userspace interruption of an internal function or handler.  NOTE: vectors 2 through 4 are related to the call time pass by reference feature.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2213</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2213" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2214, and CVE-2010-2216.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062178" comment="acroread less than 9.3.4-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2214</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2214" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2216.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062178" comment="acroread less than 9.3.4-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2215</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2215" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to trick a user into (1) selecting a link or (2) completing a dialog, related to a "click-jacking" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062178" comment="acroread less than 9.3.4-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2216</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2216" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.280 and 10.x before 10.1.82.76, and Adobe AIR before 2.0.3, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-0209, CVE-2010-2213, and CVE-2010-2214.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6dc0f226897e2807f0d495db198a2c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061978" comment="flash-player less than 10.1.82.76-0.1.1"/>
	</criteria>
	<!-- cf42df06792fbc140654995f11bbcd1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062178" comment="acroread less than 9.3.4-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2221</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2221" source="CVE"/>
	<description>
	Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4db9a1c6f547129a7ba0b581d6254caa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062558" comment="iscsitarget-kmp-default less than 1.4.19_k2.6.34.0_12-4.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062559" comment="iscsitarget-kmp-desktop less than 1.4.19_k2.6.34.0_12-4.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062560" comment="iscsitarget-kmp-pae less than 1.4.19_k2.6.34.0_12-4.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062561" comment="iscsitarget-kmp-xen less than 1.4.19_k2.6.34.0_12-4.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062562" comment="iscsitarget less than 1.4.19-4.1.1"/>
		</criteria>
	</criteria>
	<!-- 9b74cdb843432feb8f09b3e35de01b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062563" comment="tgt less than 0.9.0-7.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2225</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2225" source="CVE"/>
	<description>
	Use-after-free vulnerability in the SplObjectStorage unserializer in PHP 5.2.x and 5.3.x through 5.3.2 allows remote attackers to execute arbitrary code or obtain sensitive information via serialized data, related to the PHP unserialize function.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2227</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."
	</description>
 </metadata>
<!-- bb5b71fd7148a30e8daa6e27f0034bd5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062664" comment="tomcat6-admin-webapps less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062665" comment="tomcat6-docs-webapp less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062666" comment="tomcat6-el-1_0-api less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062667" comment="tomcat6-javadoc less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062668" comment="tomcat6-jsp-2_1-api less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062669" comment="tomcat6-lib less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062670" comment="tomcat6-servlet-2_5-api less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062671" comment="tomcat6-webapps less than 6.0.24-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062672" comment="tomcat6 less than 6.0.24-5.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2237</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2237" source="CVE"/>
	<description>
	Red Hat libvirt, possibly 0.6.1 through 0.8.2, looks up disk backing stores without referring to the user-defined main disk format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors.
	</description>
 </metadata>
<!-- 5f4d61c91f7de0dba12b7fc732a7ec3e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062673" comment="libvirt-client less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062674" comment="libvirt-devel less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062675" comment="libvirt-doc less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062676" comment="libvirt-python less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062677" comment="libvirt less than 0.8.1-4.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2238</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2238" source="CVE"/>
	<description>
	Red Hat libvirt, possibly 0.7.2 through 0.8.2, recurses into disk-image backing stores without extracting the defined disk backing-store format, which might allow guest OS users to read arbitrary files on the host OS, and possibly have unspecified other impact, via unknown vectors.
	</description>
 </metadata>
<!-- 5f4d61c91f7de0dba12b7fc732a7ec3e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062673" comment="libvirt-client less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062674" comment="libvirt-devel less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062675" comment="libvirt-doc less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062676" comment="libvirt-python less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062677" comment="libvirt less than 0.8.1-4.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2239</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2239" source="CVE"/>
	<description>
	Red Hat libvirt, possibly 0.6.0 through 0.8.2, creates new images without setting the user-defined backing-store format, which allows guest OS users to read arbitrary files on the host OS via unspecified vectors.
	</description>
 </metadata>
<!-- 5f4d61c91f7de0dba12b7fc732a7ec3e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062673" comment="libvirt-client less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062674" comment="libvirt-devel less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062675" comment="libvirt-doc less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062676" comment="libvirt-python less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062677" comment="libvirt less than 0.8.1-4.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
	<description>
	The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
	</description>
 </metadata>
<!-- 9c8b6da4223930544129699c2400e196 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062179" comment="xorg-x11-Xvnc less than 7.5_1.8.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062180" comment="xorg-x11-server-extra less than 7.5_1.8.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062181" comment="xorg-x11-server-sdk less than 7.5_1.8.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062182" comment="xorg-x11-server less than 7.5_1.8.0-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2242</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242" source="CVE"/>
	<description>
	Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
	</description>
 </metadata>
<!-- 5f4d61c91f7de0dba12b7fc732a7ec3e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062673" comment="libvirt-client less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062674" comment="libvirt-devel less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062675" comment="libvirt-doc less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062676" comment="libvirt-python less than 0.8.1-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062677" comment="libvirt less than 0.8.1-4.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2264</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2264" source="CVE"/>
	<description>
	The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2283</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2283" source="CVE"/>
	<description>
	The SMB dissector in Wireshark 0.99.6 through 1.0.13, and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (NULL pointer dereference) via unknown vectors.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2284</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2284" source="CVE"/>
	<description>
	Buffer overflow in the ASN.1 BER dissector in Wireshark 0.10.13 through 1.0.13 and 1.2.0 through 1.2.8 has unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2285</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2285" source="CVE"/>
	<description>
	The SMB PIPE dissector in Wireshark 0.8.20 through 1.0.13 and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (NULL pointer dereference) via unknown vectors.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2286</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2286" source="CVE"/>
	<description>
	The SigComp Universal Decompressor Virtual Machine dissector in Wireshark 0.10.7 through 1.0.13 and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2287</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2287" source="CVE"/>
	<description>
	Buffer overflow in the SigComp Universal Decompressor Virtual Machine dissector in Wireshark 0.10.8 through 1.0.13 and 1.2.0 through 1.2.8 has unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2295</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2295" source="CVE"/>
	<description>
	page/EventHandler.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 does not properly handle a change of the focused frame during the dispatching of keydown, which allows user-assisted remote attackers to redirect keystrokes via a crafted HTML document, aka rdar problem 7018610.  NOTE: this might overlap CVE-2010-1422.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2297</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2297" source="CVE"/>
	<description>
	rendering/FixedTableLayout.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an HTML document that has a large colspan attribute within a table.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2300</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2300" source="CVE"/>
	<description>
	Use-after-free vulnerability in the Element::normalizeAttributes function in dom/Element.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to handlers for DOM mutation events, aka rdar problem 7948784.  NOTE: this might overlap CVE-2010-1759.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2301</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2301" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in editing/markup.cpp in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to inject arbitrary web script or HTML via vectors related to the node.innerHTML property of a TEXTAREA element.  NOTE: this might overlap CVE-2010-1762.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2302</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2302" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebCore in WebKit in Google Chrome before 5.0.375.70 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors involving remote fonts in conjunction with shadow DOM trees, aka rdar problem 8007953.  NOTE: this might overlap CVE-2010-1771.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2441</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2441" source="CVE"/>
	<description>
	WebKit does not properly restrict focus changes, which allows remote attackers to read keystrokes via "cross-domain IFRAME gadgets," a different vulnerability than CVE-2010-1126, CVE-2010-1422, and CVE-2010-2295.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 30b39a83dbb36ff2cc8542600c268763 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068428" comment="libwebkit-1_0-2-32bit less than 1.2.7-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068429" comment="libwebkit-1_0-2 less than 1.2.7-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068430" comment="libwebkit-devel less than 1.2.7-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068431" comment="libwebkit-lang less than 1.2.7-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068432" comment="webkit-jsc less than 1.2.7-0.2.1"/>
		</criteria>
	</criteria>
	<!-- a287d13132a0586ee44740b31d8903f7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2480</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2480" source="CVE"/>
	<description>
	Mako before 0.3.4 relies on the cgi.escape function in the Python standard library for cross-site scripting (XSS) protection, which makes it easier for remote attackers to conduct XSS attacks via vectors involving single-quote characters and a JavaScript onLoad event handler for a BODY element.
	</description>
 </metadata>
<!-- b8d97752d94c9efd7f2ab6f6b3e9acb3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061663" comment="python-mako less than 0.2.5-4.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2492</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2492" source="CVE"/>
	<description>
	Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors.
	</description>
 </metadata>
<!-- dd4dbb1a9703e355bd477f608a23bd4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062228" comment="kernel-debug-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062229" comment="kernel-debug-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062230" comment="kernel-debug less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062231" comment="kernel-default-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062232" comment="kernel-default-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062233" comment="kernel-default less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062234" comment="kernel-desktop-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062235" comment="kernel-desktop-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062236" comment="kernel-desktop less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062237" comment="kernel-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062238" comment="kernel-ec2-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062239" comment="kernel-pae-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062240" comment="kernel-pae-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062241" comment="kernel-pae less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062242" comment="kernel-source-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062243" comment="kernel-source less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062244" comment="kernel-syms less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062245" comment="kernel-trace-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062246" comment="kernel-trace-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062247" comment="kernel-trace less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062248" comment="kernel-vanilla-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062249" comment="kernel-vanilla-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062250" comment="kernel-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062251" comment="kernel-vmi-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062252" comment="kernel-xen-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062253" comment="kernel-xen-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062254" comment="kernel-xen less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062255" comment="preload-kmp-default less than 1.1_k2.6.34.4_0.1-19.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062256" comment="preload-kmp-desktop less than 1.1_k2.6.34.4_0.1-19.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
	<description>
	Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2498</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498" source="CVE"/>
	<description>
	The psh_glyph_find_strong_points function in pshinter/pshalgo.c in FreeType before 2.4.0 does not properly implement hinting masks, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted font file that triggers an invalid free operation.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2499</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LaserWriter PS font file with an embedded PFB fragment.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2500</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500" source="CVE"/>
	<description>
	Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2519</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2520</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2522</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2522" source="CVE"/>
	<description>
	The mipv6 daemon in UMIP 0.4 does not verify that netlink messages originated in the kernel, which allows local users to spoof netlink socket communication via a crafted unicast message.
	</description>
 </metadata>
<!-- aa292ed251e943e5657cebd5c7f4fcf2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063776" comment="mipv6d less than 2.0.2-8.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2523</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2523" source="CVE"/>
	<description>
	Multiple buffer overflows in ha.c in the mipv6 daemon in UMIP 0.4 allow remote attackers to have an unspecified impact via a crafted (1) ND_OPT_PREFIX_INFORMATION or (2) ND_OPT_HOME_AGENT_INFO packet.
	</description>
 </metadata>
<!-- aa292ed251e943e5657cebd5c7f4fcf2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063776" comment="mipv6d less than 2.0.2-8.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2524</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2524" source="CVE"/>
	<description>
	The DNS resolution functionality in the CIFS implementation in the Linux kernel before 2.6.35, when CONFIG_CIFS_DFS_UPCALL is enabled, relies on a user's keyring for the dns_resolver upcall in the cifs.upcall userspace helper, which allows local users to spoof the results of DNS queries and perform arbitrary CIFS mounts via vectors involving an add_key call, related to a "cache stuffing" issue and MS-DFS referrals.
	</description>
 </metadata>
<!-- dd4dbb1a9703e355bd477f608a23bd4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062228" comment="kernel-debug-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062229" comment="kernel-debug-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062230" comment="kernel-debug less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062231" comment="kernel-default-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062232" comment="kernel-default-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062233" comment="kernel-default less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062234" comment="kernel-desktop-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062235" comment="kernel-desktop-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062236" comment="kernel-desktop less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062237" comment="kernel-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062238" comment="kernel-ec2-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062239" comment="kernel-pae-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062240" comment="kernel-pae-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062241" comment="kernel-pae less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062242" comment="kernel-source-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062243" comment="kernel-source less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062244" comment="kernel-syms less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062245" comment="kernel-trace-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062246" comment="kernel-trace-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062247" comment="kernel-trace less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062248" comment="kernel-vanilla-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062249" comment="kernel-vanilla-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062250" comment="kernel-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062251" comment="kernel-vmi-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062252" comment="kernel-xen-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062253" comment="kernel-xen-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062254" comment="kernel-xen less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062255" comment="preload-kmp-default less than 1.1_k2.6.34.4_0.1-19.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062256" comment="preload-kmp-desktop less than 1.1_k2.6.34.4_0.1-19.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2527</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527" source="CVE"/>
	<description>
	Multiple buffer overflows in demo programs in FreeType before 2.4.0 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2531</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2531" source="CVE"/>
	<description>
	The var_export function in PHP 5.2 before 5.2.14 and 5.3 before 5.3.3 flushes the output buffer to the user when certain fatal errors occur, even if display_errors is off, which allows remote attackers to obtain sensitive information by causing the application to exceed limits for memory, execution time, or recursion.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2532</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2532" source="CVE"/>
	<description>
	** DISPUTED **  lxsession-logout in lxsession in LXDE, as used on SUSE openSUSE 11.3 and other platforms, does not lock the screen when the Suspend or Hibernate button is pressed, which might make it easier for physically proximate attackers to access an unattended laptop via a resume action.  NOTE: there is no general agreement that this is a vulnerability, because separate control over locking can be an equally secure, or more secure, behavior in some threat environments.
	</description>
 </metadata>
<!-- 784acf5959d8a40e9401844d4480d29e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061778" comment="lxsession less than 0.4.4-3.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2537</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2537" source="CVE"/>
	<description>
	The btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a (1) BTRFS_IOC_CLONE or (2) BTRFS_IOC_CLONE_RANGE ioctl call that specifies this file as a donor.
	</description>
 </metadata>
<!-- dd4dbb1a9703e355bd477f608a23bd4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062228" comment="kernel-debug-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062229" comment="kernel-debug-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062230" comment="kernel-debug less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062231" comment="kernel-default-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062232" comment="kernel-default-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062233" comment="kernel-default less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062234" comment="kernel-desktop-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062235" comment="kernel-desktop-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062236" comment="kernel-desktop less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062237" comment="kernel-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062238" comment="kernel-ec2-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062239" comment="kernel-pae-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062240" comment="kernel-pae-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062241" comment="kernel-pae less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062242" comment="kernel-source-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062243" comment="kernel-source less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062244" comment="kernel-syms less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062245" comment="kernel-trace-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062246" comment="kernel-trace-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062247" comment="kernel-trace less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062248" comment="kernel-vanilla-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062249" comment="kernel-vanilla-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062250" comment="kernel-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062251" comment="kernel-vmi-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062252" comment="kernel-xen-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062253" comment="kernel-xen-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062254" comment="kernel-xen less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062255" comment="preload-kmp-default less than 1.1_k2.6.34.4_0.1-19.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062256" comment="preload-kmp-desktop less than 1.1_k2.6.34.4_0.1-19.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2538</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2538" source="CVE"/>
	<description>
	Integer overflow in the btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the Linux kernel before 2.6.35 might allow local users to obtain sensitive information via a BTRFS_IOC_CLONE_RANGE ioctl call.
	</description>
 </metadata>
<!-- dd4dbb1a9703e355bd477f608a23bd4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062228" comment="kernel-debug-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062229" comment="kernel-debug-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062230" comment="kernel-debug less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062231" comment="kernel-default-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062232" comment="kernel-default-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062233" comment="kernel-default less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062234" comment="kernel-desktop-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062235" comment="kernel-desktop-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062236" comment="kernel-desktop less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062237" comment="kernel-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062238" comment="kernel-ec2-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062239" comment="kernel-pae-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062240" comment="kernel-pae-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062241" comment="kernel-pae less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062242" comment="kernel-source-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062243" comment="kernel-source less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062244" comment="kernel-syms less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062245" comment="kernel-trace-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062246" comment="kernel-trace-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062247" comment="kernel-trace less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062248" comment="kernel-vanilla-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062249" comment="kernel-vanilla-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062250" comment="kernel-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062251" comment="kernel-vmi-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062252" comment="kernel-xen-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062253" comment="kernel-xen-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062254" comment="kernel-xen less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062255" comment="preload-kmp-default less than 1.1_k2.6.34.4_0.1-19.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062256" comment="preload-kmp-desktop less than 1.1_k2.6.34.4_0.1-19.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2541</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541" source="CVE"/>
	<description>
	Buffer overflow in ftmulti.c in the ftmulti demo program in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2542</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2542" source="CVE"/>
	<description>
	Stack-based buffer overflow in the is_git_directory function in setup.c in Git before 1.7.2.1 allows local users to gain privileges via a long gitdir: field in a .git file in a working copy.
	</description>
 </metadata>
<!-- 1092eedde0f92f110cb3f946bae3efbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065797" comment="git-arch less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065798" comment="git-core less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065799" comment="git-cvs less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065800" comment="git-daemon less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065801" comment="git-email less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065802" comment="git-gui less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065803" comment="git-remote-helpers less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065804" comment="git-svn less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065805" comment="git-web less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065806" comment="git less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065807" comment="gitk less than 1.7.1-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2547</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" source="CVE"/>
	<description>
	Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
	</description>
 </metadata>
<!-- b3712e67d3ab02ccf8377ad5c9667233 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061958" comment="gpg2-lang less than 2.0.15-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061959" comment="gpg2 less than 2.0.15-5.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2548</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2548" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 0dd5e864caa58861d13eb11eec6e74f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062148" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b18-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062149" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b18-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062150" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b18-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062151" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b18-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062152" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b18-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062153" comment="java-1_6_0-openjdk less than 1.6.0.0_b18-1.1.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2575</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2575" source="CVE"/>
	<description>
	Heap-based buffer overflow in the RLE decompression functionality in the TranscribePalmImageToJPEG function in generators/plucker/inplug/image.cpp in Okular in KDE SC 4.3.0 through 4.5.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted image in a PDB file.
	</description>
 </metadata>
<!-- 37b439436163e073e7df1927e0984c78 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063269" comment="gwenview less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063270" comment="kcolorchooser less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063271" comment="kdegraphics4 less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063272" comment="kgamma less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063273" comment="kio_kamera less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063274" comment="kolourpaint less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063275" comment="kruler less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063276" comment="ksnapshot less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063277" comment="libkdcraw-devel less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063278" comment="libkdcraw8 less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063279" comment="libkexiv2-8 less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063280" comment="libkexiv2-devel less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063281" comment="libkipi-devel less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063282" comment="libkipi7 less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063283" comment="libksane-devel less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063284" comment="libksane0 less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063285" comment="okular-devel less than 4.4.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063286" comment="okular less than 4.4.4-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2576</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2576" source="CVE"/>
	<description>
	Opera before 10.61 does not properly suppress clicks on download dialogs that became visible after a recent tab change, which allows remote attackers to conduct clickjacking attacks, and consequently execute arbitrary code, via vectors involving (1) closing a tab or (2) hiding a tab, a related issue to CVE-2005-2407.
	</description>
 </metadata>
<!-- fc29e8522bfe42b16ef8fe80ce17ecf6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062048" comment="opera less than 10.61-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2628</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2628" source="CVE"/>
	<description>
	The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
	</description>
 </metadata>
<!-- e20735c219e7595615a134b8e00408c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061967" comment="strongswan-doc less than 4.4.0-4.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061968" comment="strongswan-ikev1 less than 4.4.0-4.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061969" comment="strongswan-ikev2 less than 4.4.0-4.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061970" comment="strongswan-ipsec less than 4.4.0-4.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061971" comment="strongswan-libs0 less than 4.4.0-4.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061972" comment="strongswan-nm less than 4.4.0-4.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061973" comment="strongswan less than 4.4.0-4.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2640</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2640" source="CVE"/>
	<description>
	Array index error in the PK font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
	</description>
 </metadata>
<!-- 145705eb6e6e72c15cf2ab4ad9e5ca80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065545" comment="evince-devel less than 2.30.1-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065546" comment="evince-lang less than 2.30.1-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065547" comment="evince less than 2.30.1-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065548" comment="nautilus-evince less than 2.30.1-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2641</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2641" source="CVE"/>
	<description>
	Array index error in the VF font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
	</description>
 </metadata>
<!-- 145705eb6e6e72c15cf2ab4ad9e5ca80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065545" comment="evince-devel less than 2.30.1-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065546" comment="evince-lang less than 2.30.1-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065547" comment="evince less than 2.30.1-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065548" comment="nautilus-evince less than 2.30.1-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2642</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642" source="CVE"/>
	<description>
	Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 145705eb6e6e72c15cf2ab4ad9e5ca80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065545" comment="evince-devel less than 2.30.1-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065546" comment="evince-lang less than 2.30.1-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065547" comment="evince less than 2.30.1-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065548" comment="nautilus-evince less than 2.30.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- adbea70480ce6498af09c3437d107b65 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065870" comment="t1lib-devel less than 5.1.2-6.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065871" comment="t1lib less than 5.1.2-6.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2643</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2643" source="CVE"/>
	<description>
	Integer overflow in the TFM font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
	</description>
 </metadata>
<!-- 145705eb6e6e72c15cf2ab4ad9e5ca80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065545" comment="evince-devel less than 2.30.1-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065546" comment="evince-lang less than 2.30.1-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065547" comment="evince less than 2.30.1-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065548" comment="nautilus-evince less than 2.30.1-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2648</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2648" source="CVE"/>
	<description>
	The implementation of the Unicode Bidirectional Algorithm (aka Bidi algorithm or UBA) in Google Chrome before 5.0.375.99 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- 4060aa7c59bd870811ff835bc2e1edf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063153" comment="libwebkit-1_0-2-32bit less than 1.2.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063154" comment="libwebkit-1_0-2 less than 1.2.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063155" comment="libwebkit-devel less than 1.2.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063156" comment="libwebkit-lang less than 1.2.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063157" comment="webkit-jsc less than 1.2.4-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2713</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2713" source="CVE"/>
	<description>
	The vte_sequence_handler_window_manipulation function in vteseq.c in libvte (aka libvte9) in VTE 0.25.1 and earlier, as used in gnome-terminal, does not properly handle escape sequences, which allows remote attackers to execute arbitrary commands or obtain potentially sensitive information via a (1) window title or (2) icon title sequence.  NOTE: this issue exists because of a CVE-2003-0070 regression.
	</description>
 </metadata>
<!-- eba475581ca341d0282204f646886f90 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061713" comment="vte-devel less than 0.24.1-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061714" comment="vte-lang less than 0.24.1-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061715" comment="vte less than 0.24.1-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2751</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2751" source="CVE"/>
	<description>
	The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2752</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2752" source="CVE"/>
	<description>
	Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a618f6f1ba6d2380c7bf23f8cdfbbd8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061798" comment="MozillaThunderbird-devel less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061799" comment="MozillaThunderbird-translations-common less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061800" comment="MozillaThunderbird-translations-other less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061801" comment="MozillaThunderbird less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061805" comment="enigmail less than 1.0.1-3.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2753</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2753" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a618f6f1ba6d2380c7bf23f8cdfbbd8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061798" comment="MozillaThunderbird-devel less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061799" comment="MozillaThunderbird-translations-common less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061800" comment="MozillaThunderbird-translations-other less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061801" comment="MozillaThunderbird less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061805" comment="enigmail less than 1.0.1-3.1.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2754</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2754" source="CVE"/>
	<description>
	dom/base/nsJSEnvironment.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not properly suppress a script's URL in certain circumstances involving a redirect and an error message, which allows remote attackers to obtain sensitive information about script parameters via a crafted HTML document, related to the window.onerror handler.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 61a007d88c467ed143befea58cf693e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061810" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061818" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061819" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061811" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061820" comment="mozilla-xulrunner191-translations-common less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061821" comment="mozilla-xulrunner191-translations-other less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061814" comment="mozilla-xulrunner191 less than 1.9.1.11-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061822" comment="python-xpcom191 less than 1.9.1.11-0.1.1"/>
		</criteria>
	</criteria>
	<!-- 94fc6c315469432a43f8779997029d74 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061794" comment="seamonkey-dom-inspector less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061795" comment="seamonkey-irc less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061803" comment="seamonkey-translations-common less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061804" comment="seamonkey-translations-other less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061796" comment="seamonkey-venkman less than 2.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061797" comment="seamonkey less than 2.0.6-0.1.1"/>
		</criteria>
	</criteria>
	<!-- a618f6f1ba6d2380c7bf23f8cdfbbd8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061798" comment="MozillaThunderbird-devel less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061799" comment="MozillaThunderbird-translations-common less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061800" comment="MozillaThunderbird-translations-other less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061801" comment="MozillaThunderbird less than 3.0.6-0.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061805" comment="enigmail less than 1.0.1-3.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2755</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2755" source="CVE"/>
	<description>
	layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214.
	</description>
 </metadata>
<!-- 20228f09ab5f3c5d8a9f0695748d70ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061823" comment="MozillaFirefox-branding-upstream less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061824" comment="MozillaFirefox-translations-common less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061825" comment="MozillaFirefox-translations-other less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061826" comment="MozillaFirefox less than 3.6.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061827" comment="mozilla-js192-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061828" comment="mozilla-js192 less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061829" comment="mozilla-xulrunner192-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061830" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061831" comment="mozilla-xulrunner192-devel less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061832" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061833" comment="mozilla-xulrunner192-gnome less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061834" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061835" comment="mozilla-xulrunner192-translations-common less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061836" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061837" comment="mozilla-xulrunner192-translations-other less than 1.9.2.8-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061838" comment="mozilla-xulrunner192 less than 1.9.2.8-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2760</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTreeSelection function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via vectors involving a XUL tree selection, related to a "dangling pointer vulnerability." NOTE: this issue exists because of an incomplete fix for CVE-2010-2753.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2761</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761" source="CVE"/>
	<description>
	The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b2e32dc284341acc0d3756068c0ef366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065599" comment="perl-32bit less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065600" comment="perl-base-32bit less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065601" comment="perl-base less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065602" comment="perl-doc less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065603" comment="perl less than 5.12.1-2.3.1"/>
		</criteria>
	</criteria>
	<!-- e7c8138973c6ded363ef20e223c1e1be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065466" comment="perl-CGI-Simple less than 1.112-7.3.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2762</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2762" source="CVE"/>
	<description>
	The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox 3.6.x before 3.6.9 and Thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2763</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2763" source="CVE"/>
	<description>
	The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox before 3.5.12, Thunderbird before 3.0.7, and SeaMonkey before 2.0.7 does not properly restrict scripted functions, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2764</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2765</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765" source="CVE"/>
	<description>
	Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2766</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766" source="CVE"/>
	<description>
	The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2767</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767" source="CVE"/>
	<description>
	The navigator.plugins implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle destruction of the DOM plugin array, which might allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted access to the navigator object, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2768</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via UTF-7 encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2769</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2770</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2770" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Mac OS X allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted font in a data: URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2783</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2783" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 0dd5e864caa58861d13eb11eec6e74f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062148" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b18-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062149" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b18-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062150" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b18-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062151" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b18-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062152" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b18-1.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062153" comment="java-1_6_0-openjdk less than 1.6.0.0_b18-1.1.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2785</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2785" source="CVE"/>
	<description>
	The IRC Protocol component in KVIrc 3.x and 4.x before r4693 does not properly handle \ (backslash) characters, which allows remote authenticated users to execute arbitrary CTCP commands via vectors involving \r and \40 sequences, a different vulnerability than CVE-2010-2451 and CVE-2010-2452.
	</description>
 </metadata>
<!-- 5b535cc46f901e718aa899c8998445a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061926" comment="kvirc-devel less than 3.4.2-10.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061927" comment="kvirc less than 3.4.2-10.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2798</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2798" source="CVE"/>
	<description>
	The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel before 2.6.35 uses an incorrect size value in calculations associated with sentinel directory entries, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact by renaming a file in a GFS2 filesystem, related to the gfs2_rename function in fs/gfs2/ops_inode.c.
	</description>
 </metadata>
<!-- dd4dbb1a9703e355bd477f608a23bd4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062228" comment="kernel-debug-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062229" comment="kernel-debug-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062230" comment="kernel-debug less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062231" comment="kernel-default-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062232" comment="kernel-default-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062233" comment="kernel-default less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062234" comment="kernel-desktop-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062235" comment="kernel-desktop-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062236" comment="kernel-desktop less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062237" comment="kernel-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062238" comment="kernel-ec2-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062239" comment="kernel-pae-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062240" comment="kernel-pae-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062241" comment="kernel-pae less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062242" comment="kernel-source-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062243" comment="kernel-source less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062244" comment="kernel-syms less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062245" comment="kernel-trace-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062246" comment="kernel-trace-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062247" comment="kernel-trace less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062248" comment="kernel-vanilla-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062249" comment="kernel-vanilla-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062250" comment="kernel-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062251" comment="kernel-vmi-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062252" comment="kernel-xen-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062253" comment="kernel-xen-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062254" comment="kernel-xen less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062255" comment="preload-kmp-default less than 1.1_k2.6.34.4_0.1-19.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062256" comment="preload-kmp-desktop less than 1.1_k2.6.34.4_0.1-19.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2803</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2803" source="CVE"/>
	<description>
	The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.
	</description>
 </metadata>
<!-- 88f2cbbbab1f3b99edf6fb069cecbe65 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062772" comment="kernel-debug-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062773" comment="kernel-debug-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062774" comment="kernel-debug less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062775" comment="kernel-default-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062776" comment="kernel-default-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062777" comment="kernel-default less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062778" comment="kernel-desktop-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062779" comment="kernel-desktop-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062780" comment="kernel-desktop less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062781" comment="kernel-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062782" comment="kernel-ec2-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062783" comment="kernel-ec2-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062784" comment="kernel-ec2-extra less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062785" comment="kernel-ec2 less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062786" comment="kernel-pae-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062787" comment="kernel-pae-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062788" comment="kernel-pae less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062789" comment="kernel-source-vanilla less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062790" comment="kernel-source less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062791" comment="kernel-syms less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062792" comment="kernel-trace-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062793" comment="kernel-trace-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062794" comment="kernel-trace less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062795" comment="kernel-vanilla-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062796" comment="kernel-vanilla-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062797" comment="kernel-vanilla less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062798" comment="kernel-vmi-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062799" comment="kernel-vmi-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062800" comment="kernel-vmi less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062801" comment="kernel-xen-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062802" comment="kernel-xen-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062803" comment="kernel-xen less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062804" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.2-19.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062805" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.2-19.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
	<description>
	The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2806</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806" source="CVE"/>
	<description>
	Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via negative size values for certain strings in FontType42 font files, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2807</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807" source="CVE"/>
	<description>
	FreeType before 2.4.2 uses incorrect integer data types during bounds checking, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2808</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.
	</description>
 </metadata>
<!-- 796b885991b3fbcd870eecc67509c6dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062092" comment="libfreetype6-32bit less than 2.3.12-7.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062093" comment="libfreetype6 less than 2.3.12-7.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2862</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2862" source="CVE"/>
	<description>
	Integer overflow in CoolType.dll in Adobe Reader 8.2.3 and 9.3.3, and Acrobat 9.3.3, allows remote attackers to execute arbitrary code via a TrueType font with a large maxCompositePoints value in a Maximum Profile (maxp) table.
	</description>
 </metadata>
<!-- cf42df06792fbc140654995f11bbcd1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062178" comment="acroread less than 9.3.4-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2883</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2883" source="CVE"/>
	<description>
	Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2884</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2884" source="CVE"/>
	<description>
	Adobe Flash Player 10.1.82.76 and earlier on Windows, Mac OS X, Linux, and Solaris and 10.1.92.10 on Android; authplay.dll in Adobe Reader and Acrobat 9.x before 9.4; and authplay.dll in Adobe Reader and Acrobat 8.x before 8.2.5 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in September 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d69e5e453eb077a610413e892cb2668e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062813" comment="flash-player less than 10.1.85.3-0.1.1"/>
	</criteria>
	<!-- eed8891c855fdc5625db820413b29d27 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2887</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2887" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Adobe Reader and Acrobat 9.x before 9.4 on Linux allow attackers to gain privileges via unknown vectors.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2889</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2889" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-3626.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2890</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2890" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2891</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2891" source="CVE"/>
	<description>
	Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
	</description>
 </metadata>
<!-- f9c637f692a90b1e2ed81b9775e690c1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065400" comment="libsmi-devel less than 0.4.5-131.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065401" comment="libsmi less than 0.4.5-131.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2901</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2901" source="CVE"/>
	<description>
	The rendering implementation in Google Chrome before 5.0.375.125 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- 30b39a83dbb36ff2cc8542600c268763 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068428" comment="libwebkit-1_0-2-32bit less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068429" comment="libwebkit-1_0-2 less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068430" comment="libwebkit-devel less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068431" comment="libwebkit-lang less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068432" comment="webkit-jsc less than 1.2.7-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2935</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2935" source="CVE"/>
	<description>
	simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 738b6be686cb4004906408a9188c527a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
		</criteria>
	</criteria>
	<!-- a8ee0d4865546d7ed0f2ac2582580694 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063514" comment="OpenOffice_org-draw less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063515" comment="OpenOffice_org-impress-devel less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063516" comment="OpenOffice_org-impress-l10n-prebuilt less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063517" comment="OpenOffice_org-impress less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063518" comment="OpenOffice_org-libs-gui-devel less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063519" comment="OpenOffice_org-libs-gui-l10n-prebuilt less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063520" comment="OpenOffice_org-libs-gui less than 3.2.1.4-2.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2936</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2936" source="CVE"/>
	<description>
	Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 738b6be686cb4004906408a9188c527a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
		</criteria>
	</criteria>
	<!-- a8ee0d4865546d7ed0f2ac2582580694 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063514" comment="OpenOffice_org-draw less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063515" comment="OpenOffice_org-impress-devel less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063516" comment="OpenOffice_org-impress-l10n-prebuilt less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063517" comment="OpenOffice_org-impress less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063518" comment="OpenOffice_org-libs-gui-devel less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063519" comment="OpenOffice_org-libs-gui-l10n-prebuilt less than 3.2.1.4-2.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063520" comment="OpenOffice_org-libs-gui less than 3.2.1.4-2.1.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2939</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939" source="CVE"/>
	<description>
	Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime.  NOTE: some sources refer to this as a use-after-free issue.
	</description>
 </metadata>
<!-- 6ed49d98fb503496c8f2b0d3da0fd3c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064313" comment="libopenssl-devel less than 1.0.0-6.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064314" comment="libopenssl0_9_8-32bit less than 0.9.8m-3.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064315" comment="libopenssl0_9_8 less than 0.9.8m-3.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064316" comment="libopenssl1_0_0-32bit less than 1.0.0-6.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064317" comment="libopenssl1_0_0 less than 1.0.0-6.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064318" comment="openssl-doc less than 1.0.0-6.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064319" comment="openssl less than 1.0.0-6.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2941</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941" source="CVE"/>
	<description>
	ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.
	</description>
 </metadata>
<!-- b9517c6deeb9b6fb02cdb512c1c8745c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064799" comment="cups-client less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064800" comment="cups-ddk less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064801" comment="cups-devel less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064802" comment="cups-libs-32bit less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064803" comment="cups-libs less than 1.4.4-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064804" comment="cups less than 1.4.4-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2942</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942" source="CVE"/>
	<description>
	The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
	</description>
 </metadata>
<!-- 88f2cbbbab1f3b99edf6fb069cecbe65 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062772" comment="kernel-debug-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062773" comment="kernel-debug-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062774" comment="kernel-debug less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062775" comment="kernel-default-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062776" comment="kernel-default-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062777" comment="kernel-default less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062778" comment="kernel-desktop-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062779" comment="kernel-desktop-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062780" comment="kernel-desktop less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062781" comment="kernel-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062782" comment="kernel-ec2-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062783" comment="kernel-ec2-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062784" comment="kernel-ec2-extra less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062785" comment="kernel-ec2 less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062786" comment="kernel-pae-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062787" comment="kernel-pae-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062788" comment="kernel-pae less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062789" comment="kernel-source-vanilla less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062790" comment="kernel-source less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062791" comment="kernel-syms less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062792" comment="kernel-trace-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062793" comment="kernel-trace-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062794" comment="kernel-trace less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062795" comment="kernel-vanilla-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062796" comment="kernel-vanilla-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062797" comment="kernel-vanilla less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062798" comment="kernel-vmi-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062799" comment="kernel-vmi-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062800" comment="kernel-vmi less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062801" comment="kernel-xen-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062802" comment="kernel-xen-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062803" comment="kernel-xen less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062804" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.2-19.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062805" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.2-19.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2947</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947" source="CVE"/>
	<description>
	Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a string that is inconsistent with the expected number of fields.
	</description>
 </metadata>
<!-- a34fee3651b37f0fe3076adafe6eed1f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063460" comment="libHX22-32bit less than 3.4-2.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063461" comment="libHX22 less than 3.4-2.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2948</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2948" source="CVE"/>
	<description>
	Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message.
	</description>
 </metadata>
<!-- 6463c69c301e0624506afed76827648f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064509" comment="quagga-devel less than 0.99.17-1.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064510" comment="quagga less than 0.99.17-1.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2949</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2949" source="CVE"/>
	<description>
	bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unknown AS type in an AS path attribute in a BGP UPDATE message.
	</description>
 </metadata>
<!-- 6463c69c301e0624506afed76827648f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064509" comment="quagga-devel less than 0.99.17-1.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064510" comment="quagga less than 0.99.17-1.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2950</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2950" source="CVE"/>
	<description>
	Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2954</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954" source="CVE"/>
	<description>
	The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.
	</description>
 </metadata>
<!-- 88f2cbbbab1f3b99edf6fb069cecbe65 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062772" comment="kernel-debug-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062773" comment="kernel-debug-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062774" comment="kernel-debug less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062775" comment="kernel-default-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062776" comment="kernel-default-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062777" comment="kernel-default less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062778" comment="kernel-desktop-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062779" comment="kernel-desktop-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062780" comment="kernel-desktop less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062781" comment="kernel-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062782" comment="kernel-ec2-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062783" comment="kernel-ec2-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062784" comment="kernel-ec2-extra less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062785" comment="kernel-ec2 less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062786" comment="kernel-pae-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062787" comment="kernel-pae-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062788" comment="kernel-pae less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062789" comment="kernel-source-vanilla less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062790" comment="kernel-source less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062791" comment="kernel-syms less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062792" comment="kernel-trace-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062793" comment="kernel-trace-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062794" comment="kernel-trace less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062795" comment="kernel-vanilla-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062796" comment="kernel-vanilla-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062797" comment="kernel-vanilla less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062798" comment="kernel-vmi-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062799" comment="kernel-vmi-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062800" comment="kernel-vmi less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062801" comment="kernel-xen-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062802" comment="kernel-xen-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062803" comment="kernel-xen less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062804" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.2-19.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062805" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.2-19.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2955</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955" source="CVE"/>
	<description>
	The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
	</description>
 </metadata>
<!-- 88444f657c04ca8cab3adb2bf83ec5f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062955" comment="kernel-debug-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062956" comment="kernel-debug-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062957" comment="kernel-debug less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062958" comment="kernel-default-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062959" comment="kernel-default-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062960" comment="kernel-default less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062961" comment="kernel-desktop-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062962" comment="kernel-desktop-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062963" comment="kernel-desktop less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062964" comment="kernel-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062965" comment="kernel-ec2-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062966" comment="kernel-ec2-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062967" comment="kernel-ec2-extra less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062968" comment="kernel-ec2 less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062969" comment="kernel-pae-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062970" comment="kernel-pae-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062971" comment="kernel-pae less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062972" comment="kernel-source-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062973" comment="kernel-source less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062974" comment="kernel-syms less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062975" comment="kernel-trace-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062976" comment="kernel-trace-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062977" comment="kernel-trace less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062978" comment="kernel-vanilla-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062979" comment="kernel-vanilla-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062980" comment="kernel-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062981" comment="kernel-vmi-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062982" comment="kernel-vmi-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062983" comment="kernel-vmi less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062984" comment="kernel-xen-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062985" comment="kernel-xen-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062986" comment="kernel-xen less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062987" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.3-19.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062988" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.3-19.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2956</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956" source="CVE"/>
	<description>
	Sudo 1.7.0 through 1.7.4p3, when a Runas group is configured, does not properly handle use of the -u option in conjunction with the -g option, which allows local users to gain privileges via a command line containing a "-u root" sequence.
	</description>
 </metadata>
<!-- a0da96f92e34b28fb3e366543f49fb57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062257" comment="sudo less than 1.7.2p7-2.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2959</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2959" source="CVE"/>
	<description>
	Integer overflow in net/can/bcm.c in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows attackers to execute arbitrary code or cause a denial of service (system crash) via crafted CAN traffic.
	</description>
 </metadata>
<!-- 88f2cbbbab1f3b99edf6fb069cecbe65 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062772" comment="kernel-debug-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062773" comment="kernel-debug-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062774" comment="kernel-debug less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062775" comment="kernel-default-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062776" comment="kernel-default-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062777" comment="kernel-default less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062778" comment="kernel-desktop-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062779" comment="kernel-desktop-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062780" comment="kernel-desktop less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062781" comment="kernel-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062782" comment="kernel-ec2-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062783" comment="kernel-ec2-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062784" comment="kernel-ec2-extra less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062785" comment="kernel-ec2 less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062786" comment="kernel-pae-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062787" comment="kernel-pae-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062788" comment="kernel-pae less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062789" comment="kernel-source-vanilla less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062790" comment="kernel-source less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062791" comment="kernel-syms less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062792" comment="kernel-trace-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062793" comment="kernel-trace-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062794" comment="kernel-trace less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062795" comment="kernel-vanilla-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062796" comment="kernel-vanilla-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062797" comment="kernel-vanilla less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062798" comment="kernel-vmi-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062799" comment="kernel-vmi-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062800" comment="kernel-vmi less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062801" comment="kernel-xen-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062802" comment="kernel-xen-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062803" comment="kernel-xen less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062804" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.2-19.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062805" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.2-19.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2960</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2960" source="CVE"/>
	<description>
	The keyctl_session_to_parent function in security/keys/keyctl.c in the Linux kernel 2.6.35.4 and earlier expects that a certain parent session keyring exists, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a KEYCTL_SESSION_TO_PARENT argument to the keyctl function.
	</description>
 </metadata>
<!-- 88444f657c04ca8cab3adb2bf83ec5f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062955" comment="kernel-debug-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062956" comment="kernel-debug-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062957" comment="kernel-debug less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062958" comment="kernel-default-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062959" comment="kernel-default-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062960" comment="kernel-default less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062961" comment="kernel-desktop-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062962" comment="kernel-desktop-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062963" comment="kernel-desktop less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062964" comment="kernel-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062965" comment="kernel-ec2-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062966" comment="kernel-ec2-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062967" comment="kernel-ec2-extra less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062968" comment="kernel-ec2 less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062969" comment="kernel-pae-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062970" comment="kernel-pae-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062971" comment="kernel-pae less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062972" comment="kernel-source-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062973" comment="kernel-source less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062974" comment="kernel-syms less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062975" comment="kernel-trace-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062976" comment="kernel-trace-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062977" comment="kernel-trace less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062978" comment="kernel-vanilla-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062979" comment="kernel-vanilla-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062980" comment="kernel-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062981" comment="kernel-vmi-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062982" comment="kernel-vmi-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062983" comment="kernel-vmi less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062984" comment="kernel-xen-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062985" comment="kernel-xen-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062986" comment="kernel-xen less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062987" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.3-19.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062988" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.3-19.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2962</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2962" source="CVE"/>
	<description>
	drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.
	</description>
 </metadata>
<!-- d0a7d8f91194d49d17006fb488ba2923 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063521" comment="kernel-debug-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063522" comment="kernel-debug-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063523" comment="kernel-debug less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063524" comment="kernel-default-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063525" comment="kernel-default-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063526" comment="kernel-default less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063527" comment="kernel-desktop-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063528" comment="kernel-desktop-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063529" comment="kernel-desktop less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063530" comment="kernel-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063531" comment="kernel-ec2-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063532" comment="kernel-ec2-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063533" comment="kernel-ec2-extra less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063534" comment="kernel-ec2 less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063535" comment="kernel-pae-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063536" comment="kernel-pae-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063537" comment="kernel-pae less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063538" comment="kernel-source-vanilla less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063539" comment="kernel-source less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063540" comment="kernel-syms less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063541" comment="kernel-trace-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063542" comment="kernel-trace-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063543" comment="kernel-trace less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063544" comment="kernel-vanilla-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063545" comment="kernel-vanilla-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063546" comment="kernel-vanilla less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063547" comment="kernel-vmi-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063548" comment="kernel-vmi-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063549" comment="kernel-vmi less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063550" comment="kernel-xen-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063551" comment="kernel-xen-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063552" comment="kernel-xen less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063553" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.4-19.1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063554" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.4-19.1.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2963</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2963" source="CVE"/>
	<description>
	drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementation in the Linux kernel before 2.6.36 on 64-bit platforms does not validate the destination of a memory copy operation, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via a VIDIOCSTUNER ioctl call on a /dev/video device, followed by a VIDIOCSMICROCODE ioctl call on this device.
	</description>
 </metadata>
<!-- 0d27f71c8c526944c6fdd4e2a5422878 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063932" comment="kernel-debug-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063933" comment="kernel-debug-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063934" comment="kernel-debug less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063935" comment="kernel-default-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063936" comment="kernel-default-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063937" comment="kernel-default less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063938" comment="kernel-desktop-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063939" comment="kernel-desktop-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063940" comment="kernel-desktop less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063941" comment="kernel-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063942" comment="kernel-ec2-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063943" comment="kernel-ec2-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063944" comment="kernel-ec2-extra less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063945" comment="kernel-ec2 less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063946" comment="kernel-pae-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063947" comment="kernel-pae-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063948" comment="kernel-pae less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063949" comment="kernel-source-vanilla less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063950" comment="kernel-source less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063951" comment="kernel-syms less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063952" comment="kernel-trace-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063953" comment="kernel-trace-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063954" comment="kernel-trace less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063955" comment="kernel-vanilla-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063956" comment="kernel-vanilla-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063957" comment="kernel-vanilla less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063958" comment="kernel-vmi-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063959" comment="kernel-vmi-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063960" comment="kernel-vmi less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063961" comment="kernel-xen-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063962" comment="kernel-xen-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063963" comment="kernel-xen less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063964" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.5-19.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063965" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.5-19.1.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2992</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2992" source="CVE"/>
	<description>
	packet-gsm_a_rr.c in the GSM A RR dissector in Wireshark 1.2.2 through 1.2.9 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2993</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2993" source="CVE"/>
	<description>
	The IPMI dissector in Wireshark 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2994</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2994" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ASN.1 BER dissector in Wireshark 0.10.13 through 1.0.14 and 1.2.0 through 1.2.9 has unknown impact and remote attack vectors.  NOTE: this issue exists because of a CVE-2010-2284 regression.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2995</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-2995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2995" source="CVE"/>
	<description>
	The SigComp Universal Decompressor Virtual Machine (UDVM) in Wireshark 0.10.8 through 1.0.14 and 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to sigcomp-udvm.c and an off-by-one error, which triggers a buffer overflow, different vulnerabilities than CVE-2010-2287.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3019</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3019" source="CVE"/>
	<description>
	Heap-based buffer overflow in Opera before 10.61 allows remote attackers to execute arbitrary code or cause a denial of service (application crash or hang) via vectors related to HTML5 canvas painting operations that occur during the application of transformations.
	</description>
 </metadata>
<!-- fc29e8522bfe42b16ef8fe80ce17ecf6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062048" comment="opera less than 10.61-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3020</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3020" source="CVE"/>
	<description>
	The news-feed preview feature in Opera before 10.61 does not properly remove scripts, which allows remote attackers to force subscriptions to arbitrary feeds via crafted content.
	</description>
 </metadata>
<!-- fc29e8522bfe42b16ef8fe80ce17ecf6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062048" comment="opera less than 10.61-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3021</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3021" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 10.61 allows remote attackers to cause a denial of service (CPU consumption and application hang) via an animated PNG image.
	</description>
 </metadata>
<!-- fc29e8522bfe42b16ef8fe80ce17ecf6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062048" comment="opera less than 10.61-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
	<description>
	bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
	</description>
 </metadata>
<!-- 35cdbe0ae41b2eede7a95bdce718ab94 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063473" comment="freetype2-devel-32bit less than 2.3.12-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063474" comment="freetype2-devel less than 2.3.12-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063475" comment="libfreetype6-32bit less than 2.3.12-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063476" comment="libfreetype6 less than 2.3.12-7.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
	<description>
	Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
	</description>
 </metadata>
<!-- 35cdbe0ae41b2eede7a95bdce718ab94 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063473" comment="freetype2-devel-32bit less than 2.3.12-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063474" comment="freetype2-devel less than 2.3.12-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063475" comment="libfreetype6-32bit less than 2.3.12-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063476" comment="libfreetype6 less than 2.3.12-7.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3062</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3062" source="CVE"/>
	<description>
	mysqlnd_wireprotocol.c in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows remote attackers to (1) read sensitive memory via a modified length value, which is not properly handled by the php_mysqlnd_ok_read function; or (2) trigger a heap-based buffer overflow via a modified length value, which is not properly handled by the php_mysqlnd_rset_header_read function.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3063</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3063" source="CVE"/>
	<description>
	The php_mysqlnd_read_error_from_line function in the Mysqlnd extension in PHP 5.3 through 5.3.2 does not properly calculate a buffer length, which allows context-dependent attackers to trigger a heap-based buffer overflow via crafted inputs that cause a negative length value to be used.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3064</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3064" source="CVE"/>
	<description>
	Stack-based buffer overflow in the php_mysqlnd_auth_write function in the Mysqlnd extension in PHP 5.3 through 5.3.2 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long (1) username or (2) database name argument to the (a) mysql_connect or (b) mysqli_connect function.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3065</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3065" source="CVE"/>
	<description>
	The default session serializer in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 does not properly handle the PS_UNDEF_MARKER marker, which allows context-dependent attackers to modify arbitrary session variables via a crafted session variable name.
	</description>
 </metadata>
<!-- 04d7af1b010b9bd2736fdd80a7be9a92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062504" comment="apache2-mod_php5 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062505" comment="php5-bcmath less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062506" comment="php5-bz2 less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062507" comment="php5-calendar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062508" comment="php5-ctype less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062509" comment="php5-curl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062510" comment="php5-dba less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062511" comment="php5-devel less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062512" comment="php5-dom less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062513" comment="php5-enchant less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062514" comment="php5-exif less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062515" comment="php5-fastcgi less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062516" comment="php5-fileinfo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062517" comment="php5-ftp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062518" comment="php5-gd less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062519" comment="php5-gettext less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062520" comment="php5-gmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062521" comment="php5-hash less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062522" comment="php5-iconv less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062523" comment="php5-imap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062524" comment="php5-intl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062525" comment="php5-json less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062526" comment="php5-ldap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062527" comment="php5-mbstring less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062528" comment="php5-mcrypt less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062529" comment="php5-mysql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062530" comment="php5-odbc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062531" comment="php5-openssl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062532" comment="php5-pcntl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062533" comment="php5-pdo less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062534" comment="php5-pear less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062535" comment="php5-pgsql less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062536" comment="php5-phar less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062537" comment="php5-posix less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062538" comment="php5-pspell less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062539" comment="php5-readline less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062540" comment="php5-shmop less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062541" comment="php5-snmp less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062542" comment="php5-soap less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062543" comment="php5-sockets less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062544" comment="php5-sqlite less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062545" comment="php5-suhosin less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062546" comment="php5-sysvmsg less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062547" comment="php5-sysvsem less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062548" comment="php5-sysvshm less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062549" comment="php5-tidy less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062550" comment="php5-tokenizer less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062551" comment="php5-wddx less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062552" comment="php5-xmlreader less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062553" comment="php5-xmlrpc less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062554" comment="php5-xmlwriter less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062555" comment="php5-xsl less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062556" comment="php5-zip less than 5.3.3-0.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062557" comment="php5-zlib less than 5.3.3-0.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3067</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067" source="CVE"/>
	<description>
	Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
	<description>
	Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
	</description>
 </metadata>
<!-- 13872b4180866950c95a2565b8265480 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062989" comment="ldapsmb less than 1.34b-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062990" comment="libldb-devel less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062991" comment="libldb0 less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062992" comment="libnetapi-devel less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062993" comment="libnetapi0 less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062994" comment="libsmbclient-devel less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062995" comment="libsmbclient0-32bit less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062996" comment="libsmbclient0 less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062997" comment="libsmbsharemodes-devel less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062998" comment="libsmbsharemodes0 less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062999" comment="libtalloc-devel less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063000" comment="libtalloc2 less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063001" comment="libtdb-devel less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063002" comment="libtdb1-32bit less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063003" comment="libtdb1 less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063004" comment="libtevent-devel less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063005" comment="libtevent0 less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063006" comment="libwbclient-devel less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063007" comment="libwbclient0-32bit less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063008" comment="libwbclient0 less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063009" comment="samba-32bit less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063010" comment="samba-client-32bit less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063011" comment="samba-client less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063012" comment="samba-devel less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063013" comment="samba-doc less than 3.5.4-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063014" comment="samba-doc less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063015" comment="samba-krb-printing less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063016" comment="samba-winbind-32bit less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063017" comment="samba-winbind less than 3.5.4-5.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063018" comment="samba less than 3.5.4-5.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3072</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3072" source="CVE"/>
	<description>
	The string-comparison functions in String.cci in Squid 3.x before 3.1.8 and 3.2.x before 3.2.0.2 allow remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
	</description>
 </metadata>
<!-- f3c1e132352912583f94eb60c2703be5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063555" comment="squid3 less than 3.0.STABLE25-2.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3073</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3073" source="CVE"/>
	<description>
	SSL_Cipher.cpp in EncFS before 1.7.0 does not properly handle integer data sizes when constructing headers intended for randomization of initialization vectors, which makes it easier for local users to obtain sensitive information by defeating cryptographic protection mechanisms.
	</description>
 </metadata>
<!-- 7f3f14b55ba6b890b38c801f8c66c6b3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064844" comment="encfs less than 1.6.0-2.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3074</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3074" source="CVE"/>
	<description>
	SSL_Cipher.cpp in EncFS before 1.7.0 uses an improper combination of an AES cipher and a CBC cipher mode for encrypted filesystems, which allows local users to obtain sensitive information via a watermark attack.
	</description>
 </metadata>
<!-- 7f3f14b55ba6b890b38c801f8c66c6b3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064844" comment="encfs less than 1.6.0-2.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3075</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3075" source="CVE"/>
	<description>
	EncFS before 1.7.0 encrypts multiple blocks by means of the CFB cipher mode with the same initialization vector, which makes it easier for local users to obtain sensitive information via calculations involving recovery of XORed data, as demonstrated by an attack on encrypted data in which the last block contains only one byte.
	</description>
 </metadata>
<!-- 7f3f14b55ba6b890b38c801f8c66c6b3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064844" comment="encfs less than 1.6.0-2.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3078</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3078" source="CVE"/>
	<description>
	The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
	</description>
 </metadata>
<!-- 88f2cbbbab1f3b99edf6fb069cecbe65 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062772" comment="kernel-debug-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062773" comment="kernel-debug-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062774" comment="kernel-debug less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062775" comment="kernel-default-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062776" comment="kernel-default-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062777" comment="kernel-default less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062778" comment="kernel-desktop-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062779" comment="kernel-desktop-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062780" comment="kernel-desktop less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062781" comment="kernel-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062782" comment="kernel-ec2-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062783" comment="kernel-ec2-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062784" comment="kernel-ec2-extra less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062785" comment="kernel-ec2 less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062786" comment="kernel-pae-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062787" comment="kernel-pae-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062788" comment="kernel-pae less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062789" comment="kernel-source-vanilla less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062790" comment="kernel-source less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062791" comment="kernel-syms less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062792" comment="kernel-trace-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062793" comment="kernel-trace-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062794" comment="kernel-trace less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062795" comment="kernel-vanilla-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062796" comment="kernel-vanilla-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062797" comment="kernel-vanilla less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062798" comment="kernel-vmi-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062799" comment="kernel-vmi-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062800" comment="kernel-vmi less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062801" comment="kernel-xen-base less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062802" comment="kernel-xen-devel less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062803" comment="kernel-xen less than 2.6.34.7-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062804" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.2-19.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062805" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.2-19.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3079</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3079" source="CVE"/>
	<description>
	kernel/trace/ftrace.c in the Linux kernel before 2.6.35.5, when debugfs is enabled, does not properly handle interaction between mutex possession and llseek operations, which allows local users to cause a denial of service (NULL pointer dereference and outage of all function tracing files) via an lseek call on a file descriptor associated with the set_ftrace_filter file.
	</description>
 </metadata>
<!-- 88444f657c04ca8cab3adb2bf83ec5f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062955" comment="kernel-debug-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062956" comment="kernel-debug-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062957" comment="kernel-debug less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062958" comment="kernel-default-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062959" comment="kernel-default-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062960" comment="kernel-default less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062961" comment="kernel-desktop-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062962" comment="kernel-desktop-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062963" comment="kernel-desktop less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062964" comment="kernel-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062965" comment="kernel-ec2-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062966" comment="kernel-ec2-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062967" comment="kernel-ec2-extra less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062968" comment="kernel-ec2 less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062969" comment="kernel-pae-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062970" comment="kernel-pae-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062971" comment="kernel-pae less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062972" comment="kernel-source-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062973" comment="kernel-source less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062974" comment="kernel-syms less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062975" comment="kernel-trace-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062976" comment="kernel-trace-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062977" comment="kernel-trace less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062978" comment="kernel-vanilla-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062979" comment="kernel-vanilla-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062980" comment="kernel-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062981" comment="kernel-vmi-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062982" comment="kernel-vmi-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062983" comment="kernel-vmi less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062984" comment="kernel-xen-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062985" comment="kernel-xen-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062986" comment="kernel-xen less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062987" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.3-19.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062988" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.3-19.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3080</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3080" source="CVE"/>
	<description>
	Double free vulnerability in the snd_seq_oss_open function in sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4 might allow local users to cause a denial of service or possibly have unspecified other impact via an unsuccessful attempt to open the /dev/sequencer device.
	</description>
 </metadata>
<!-- 88444f657c04ca8cab3adb2bf83ec5f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062955" comment="kernel-debug-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062956" comment="kernel-debug-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062957" comment="kernel-debug less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062958" comment="kernel-default-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062959" comment="kernel-default-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062960" comment="kernel-default less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062961" comment="kernel-desktop-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062962" comment="kernel-desktop-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062963" comment="kernel-desktop less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062964" comment="kernel-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062965" comment="kernel-ec2-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062966" comment="kernel-ec2-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062967" comment="kernel-ec2-extra less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062968" comment="kernel-ec2 less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062969" comment="kernel-pae-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062970" comment="kernel-pae-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062971" comment="kernel-pae less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062972" comment="kernel-source-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062973" comment="kernel-source less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062974" comment="kernel-syms less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062975" comment="kernel-trace-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062976" comment="kernel-trace-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062977" comment="kernel-trace less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062978" comment="kernel-vanilla-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062979" comment="kernel-vanilla-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062980" comment="kernel-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062981" comment="kernel-vmi-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062982" comment="kernel-vmi-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062983" comment="kernel-vmi less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062984" comment="kernel-xen-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062985" comment="kernel-xen-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062986" comment="kernel-xen less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062987" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.3-19.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062988" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.3-19.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3081</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081" source="CVE"/>
	<description>
	The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
	</description>
 </metadata>
<!-- 88444f657c04ca8cab3adb2bf83ec5f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062955" comment="kernel-debug-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062956" comment="kernel-debug-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062957" comment="kernel-debug less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062958" comment="kernel-default-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062959" comment="kernel-default-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062960" comment="kernel-default less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062961" comment="kernel-desktop-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062962" comment="kernel-desktop-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062963" comment="kernel-desktop less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062964" comment="kernel-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062965" comment="kernel-ec2-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062966" comment="kernel-ec2-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062967" comment="kernel-ec2-extra less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062968" comment="kernel-ec2 less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062969" comment="kernel-pae-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062970" comment="kernel-pae-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062971" comment="kernel-pae less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062972" comment="kernel-source-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062973" comment="kernel-source less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062974" comment="kernel-syms less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062975" comment="kernel-trace-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062976" comment="kernel-trace-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062977" comment="kernel-trace less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062978" comment="kernel-vanilla-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062979" comment="kernel-vanilla-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062980" comment="kernel-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062981" comment="kernel-vmi-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062982" comment="kernel-vmi-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062983" comment="kernel-vmi less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062984" comment="kernel-xen-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062985" comment="kernel-xen-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062986" comment="kernel-xen less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062987" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.3-19.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062988" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.3-19.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3084</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3084" source="CVE"/>
	<description>
	Buffer overflow in the niu_get_ethtool_tcam_all function in drivers/net/niu.c in the Linux kernel before 2.6.36-rc4 allows local users to cause a denial of service or possibly have unspecified other impact via the ETHTOOL_GRXCLSRLALL ethtool command.
	</description>
 </metadata>
<!-- 88444f657c04ca8cab3adb2bf83ec5f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062955" comment="kernel-debug-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062956" comment="kernel-debug-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062957" comment="kernel-debug less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062958" comment="kernel-default-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062959" comment="kernel-default-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062960" comment="kernel-default less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062961" comment="kernel-desktop-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062962" comment="kernel-desktop-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062963" comment="kernel-desktop less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062964" comment="kernel-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062965" comment="kernel-ec2-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062966" comment="kernel-ec2-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062967" comment="kernel-ec2-extra less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062968" comment="kernel-ec2 less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062969" comment="kernel-pae-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062970" comment="kernel-pae-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062971" comment="kernel-pae less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062972" comment="kernel-source-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062973" comment="kernel-source less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062974" comment="kernel-syms less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062975" comment="kernel-trace-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062976" comment="kernel-trace-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062977" comment="kernel-trace less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062978" comment="kernel-vanilla-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062979" comment="kernel-vanilla-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062980" comment="kernel-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062981" comment="kernel-vmi-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062982" comment="kernel-vmi-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062983" comment="kernel-vmi less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062984" comment="kernel-xen-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062985" comment="kernel-xen-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062986" comment="kernel-xen less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062987" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.3-19.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062988" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.3-19.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3087</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3087" source="CVE"/>
	<description>
	LibTIFF before 3.9.2-5.2.1 in SUSE openSUSE 11.3 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted TIFF image.
	</description>
 </metadata>
<!-- abb34e6ed4d720d7dcc00eb8ca96550a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062678" comment="libtiff-devel-32bit less than 3.9.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062679" comment="libtiff-devel less than 3.9.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062680" comment="libtiff3-32bit less than 3.9.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062681" comment="libtiff3 less than 3.9.2-5.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062682" comment="tiff less than 3.9.2-5.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3089</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3089" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.
	</description>
 </metadata>
<!-- 4b2b721d1b754e85fd46bd42ce5af4fe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066987" comment="mailman less than 2.1.14-6.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3110</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3110" source="CVE"/>
	<description>
	Multiple buffer overflows in the Novell Client novfs module for the Linux kernel in SUSE Linux Enterprise 11 SP1 and openSUSE 11.3 allow local users to gain privileges via unspecified vectors.
	</description>
 </metadata>
<!-- dd4dbb1a9703e355bd477f608a23bd4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062228" comment="kernel-debug-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062229" comment="kernel-debug-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062230" comment="kernel-debug less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062231" comment="kernel-default-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062232" comment="kernel-default-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062233" comment="kernel-default less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062234" comment="kernel-desktop-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062235" comment="kernel-desktop-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062236" comment="kernel-desktop less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062237" comment="kernel-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062238" comment="kernel-ec2-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062239" comment="kernel-pae-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062240" comment="kernel-pae-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062241" comment="kernel-pae less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062242" comment="kernel-source-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062243" comment="kernel-source less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062244" comment="kernel-syms less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062245" comment="kernel-trace-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062246" comment="kernel-trace-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062247" comment="kernel-trace less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062248" comment="kernel-vanilla-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062249" comment="kernel-vanilla-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062250" comment="kernel-vanilla less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062251" comment="kernel-vmi-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062252" comment="kernel-xen-base less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062253" comment="kernel-xen-devel less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062254" comment="kernel-xen less than 2.6.34.4-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062255" comment="preload-kmp-default less than 1.1_k2.6.34.4_0.1-19.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062256" comment="preload-kmp-desktop less than 1.1_k2.6.34.4_0.1-19.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3116</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3116" source="CVE"/>
	<description>
	Multiple use-after-free vulnerabilities in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 5.0.375.127, and webkitgtk before 1.2.6, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to improper handling of MIME types by plug-ins.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3131</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3131" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Windows XP allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .htm, .html, .jtx, .mfp, or .eml file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3166</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3167</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167" source="CVE"/>
	<description>
	The nsTreeContentView function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle node removal in XUL trees, which allows remote attackers to execute arbitrary code via vectors involving access to deleted memory, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3168</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause a denial of service (deleted memory access and application crash) or possibly execute arbitrary code by setting unspecified properties.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3169</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 304674e113be0505ef0fdcd161330c41 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063393" comment="mozilla-xulrunner191-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063394" comment="mozilla-xulrunner191-devel less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063395" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063396" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063397" comment="mozilla-xulrunner191-translations-common less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063398" comment="mozilla-xulrunner191-translations-other less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063399" comment="mozilla-xulrunner191 less than 1.9.1.13-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063400" comment="python-xpcom191 less than 1.9.1.13-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 3561711407b55f4ba346ebb9cb14b576 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063414" comment="MozillaThunderbird-devel less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063415" comment="MozillaThunderbird-translations-common less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063416" comment="MozillaThunderbird-translations-other less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063417" comment="MozillaThunderbird less than 3.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063418" comment="enigmail less than 1.0.1-3.3.1"/>
		</criteria>
	</criteria>
	<!-- 4c0b25572497cbde8fae1186f2281e5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062744" comment="MozillaFirefox-branding-upstream less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062745" comment="MozillaFirefox-translations-common less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062746" comment="MozillaFirefox-translations-other less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062747" comment="MozillaFirefox less than 3.6.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062748" comment="mozilla-js192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062749" comment="mozilla-js192 less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062750" comment="mozilla-xulrunner192-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062751" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062752" comment="mozilla-xulrunner192-devel less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062753" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062754" comment="mozilla-xulrunner192-gnome less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062755" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062756" comment="mozilla-xulrunner192-translations-common less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062757" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062758" comment="mozilla-xulrunner192-translations-other less than 1.9.2.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062759" comment="mozilla-xulrunner192 less than 1.9.2.10-0.4.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
	<!-- e1e3048ba55b8c28635500353ce179fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062760" comment="seamonkey-dom-inspector less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062761" comment="seamonkey-irc less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062770" comment="seamonkey-translations-common less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062771" comment="seamonkey-translations-other less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062762" comment="seamonkey-venkman less than 2.0.8-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062763" comment="seamonkey less than 2.0.8-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3170</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 32e930a50eca8c752cb161077c686997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063906" comment="libfreebl3-32bit less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063907" comment="libfreebl3 less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063966" comment="libsoftokn3-32bit less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063967" comment="libsoftokn3 less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063908" comment="mozilla-nspr-32bit less than 4.8.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063909" comment="mozilla-nspr-devel less than 4.8.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063910" comment="mozilla-nspr less than 4.8.6-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063911" comment="mozilla-nss-32bit less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063968" comment="mozilla-nss-certs-32bit less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063969" comment="mozilla-nss-certs less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063912" comment="mozilla-nss-devel less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063970" comment="mozilla-nss-sysinit-32bit less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063971" comment="mozilla-nss-sysinit less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063913" comment="mozilla-nss-tools less than 3.12.8-1.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063914" comment="mozilla-nss less than 3.12.8-1.1.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3172</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3172" source="CVE"/>
	<description>
	CRLF injection vulnerability in Bugzilla before 3.2.9, 3.4.x before 3.4.9, 3.6.x before 3.6.3, and 4.0.x before 4.0rc1, when Server Push is enabled in a web browser, allows remote attackers to inject arbitrary HTTP headers and content, and conduct HTTP response splitting attacks, via a crafted URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b2e32dc284341acc0d3756068c0ef366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065599" comment="perl-32bit less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065600" comment="perl-base-32bit less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065601" comment="perl-base less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065602" comment="perl-doc less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065603" comment="perl less than 5.12.1-2.3.1"/>
		</criteria>
	</criteria>
	<!-- e7c8138973c6ded363ef20e223c1e1be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065466" comment="perl-CGI-Simple less than 1.112-7.3.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3173</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173" source="CVE"/>
	<description>
	The SSL implementation in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly set the minimum key length for Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
	</description>
 </metadata>
<!-- 32e930a50eca8c752cb161077c686997 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063906" comment="libfreebl3-32bit less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063907" comment="libfreebl3 less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063966" comment="libsoftokn3-32bit less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063967" comment="libsoftokn3 less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063908" comment="mozilla-nspr-32bit less than 4.8.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063909" comment="mozilla-nspr-devel less than 4.8.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063910" comment="mozilla-nspr less than 4.8.6-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063911" comment="mozilla-nss-32bit less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063968" comment="mozilla-nss-certs-32bit less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063969" comment="mozilla-nss-certs less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063912" comment="mozilla-nss-devel less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063970" comment="mozilla-nss-sysinit-32bit less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063971" comment="mozilla-nss-sysinit less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063913" comment="mozilla-nss-tools less than 3.12.8-1.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063914" comment="mozilla-nss less than 3.12.8-1.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3174</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.14, Thunderbird before 3.0.9, and SeaMonkey before 2.0.9 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3175</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3175" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3176</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3177</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the Gopher parser in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, and SeaMonkey before 2.0.9, allow remote attackers to inject arbitrary web script or HTML via a crafted name of a (1) file or (2) directory on a Gopher server.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3178</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3179</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179" source="CVE"/>
	<description>
	Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3180</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsBarProp function in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code by accessing the locationbar property of a closed window.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3182</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3182" source="CVE"/>
	<description>
	A certain application-launch script in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Linux places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3183</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183" source="CVE"/>
	<description>
	The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06d93a6ef3aeb4df49003f48d9ff324b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063897" comment="seamonkey-dom-inspector less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063898" comment="seamonkey-irc less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063925" comment="seamonkey-translations-common less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063926" comment="seamonkey-translations-other less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063899" comment="seamonkey-venkman less than 2.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063900" comment="seamonkey less than 2.0.9-0.5.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- dfecf4af4b1aa0403d44b3d1158232ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063927" comment="MozillaThunderbird-devel less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063928" comment="MozillaThunderbird-translations-common less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063929" comment="MozillaThunderbird-translations-other less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063930" comment="MozillaThunderbird less than 3.0.9-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063931" comment="enigmail less than 1.0.1-3.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3257</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3257" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3257" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving element focus.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3259</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3259" source="CVE"/>
	<description>
	WebKit, as used in Apple Safari before 4.1.3 and 5.0.x before 5.0.3, Google Chrome before 6.0.472.53, and webkitgtk before 1.2.6, does not properly restrict read access to images derived from CANVAS elements, which allows remote attackers to bypass the Same Origin Policy and obtain potentially sensitive image data via a crafted web site.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3296</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296" source="CVE"/>
	<description>
	The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
	</description>
 </metadata>
<!-- 88444f657c04ca8cab3adb2bf83ec5f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062955" comment="kernel-debug-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062956" comment="kernel-debug-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062957" comment="kernel-debug less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062958" comment="kernel-default-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062959" comment="kernel-default-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062960" comment="kernel-default less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062961" comment="kernel-desktop-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062962" comment="kernel-desktop-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062963" comment="kernel-desktop less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062964" comment="kernel-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062965" comment="kernel-ec2-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062966" comment="kernel-ec2-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062967" comment="kernel-ec2-extra less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062968" comment="kernel-ec2 less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062969" comment="kernel-pae-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062970" comment="kernel-pae-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062971" comment="kernel-pae less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062972" comment="kernel-source-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062973" comment="kernel-source less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062974" comment="kernel-syms less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062975" comment="kernel-trace-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062976" comment="kernel-trace-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062977" comment="kernel-trace less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062978" comment="kernel-vanilla-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062979" comment="kernel-vanilla-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062980" comment="kernel-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062981" comment="kernel-vmi-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062982" comment="kernel-vmi-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062983" comment="kernel-vmi less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062984" comment="kernel-xen-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062985" comment="kernel-xen-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062986" comment="kernel-xen less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062987" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.3-19.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062988" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.3-19.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3297</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297" source="CVE"/>
	<description>
	The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
	</description>
 </metadata>
<!-- 88444f657c04ca8cab3adb2bf83ec5f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062955" comment="kernel-debug-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062956" comment="kernel-debug-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062957" comment="kernel-debug less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062958" comment="kernel-default-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062959" comment="kernel-default-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062960" comment="kernel-default less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062961" comment="kernel-desktop-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062962" comment="kernel-desktop-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062963" comment="kernel-desktop less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062964" comment="kernel-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062965" comment="kernel-ec2-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062966" comment="kernel-ec2-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062967" comment="kernel-ec2-extra less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062968" comment="kernel-ec2 less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062969" comment="kernel-pae-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062970" comment="kernel-pae-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062971" comment="kernel-pae less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062972" comment="kernel-source-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062973" comment="kernel-source less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062974" comment="kernel-syms less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062975" comment="kernel-trace-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062976" comment="kernel-trace-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062977" comment="kernel-trace less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062978" comment="kernel-vanilla-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062979" comment="kernel-vanilla-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062980" comment="kernel-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062981" comment="kernel-vmi-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062982" comment="kernel-vmi-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062983" comment="kernel-vmi less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062984" comment="kernel-xen-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062985" comment="kernel-xen-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062986" comment="kernel-xen less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062987" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.3-19.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062988" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.3-19.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3298</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298" source="CVE"/>
	<description>
	The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
	</description>
 </metadata>
<!-- 88444f657c04ca8cab3adb2bf83ec5f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062955" comment="kernel-debug-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062956" comment="kernel-debug-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062957" comment="kernel-debug less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062958" comment="kernel-default-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062959" comment="kernel-default-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062960" comment="kernel-default less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062961" comment="kernel-desktop-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062962" comment="kernel-desktop-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062963" comment="kernel-desktop less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062964" comment="kernel-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062965" comment="kernel-ec2-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062966" comment="kernel-ec2-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062967" comment="kernel-ec2-extra less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062968" comment="kernel-ec2 less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062969" comment="kernel-pae-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062970" comment="kernel-pae-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062971" comment="kernel-pae less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062972" comment="kernel-source-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062973" comment="kernel-source less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062974" comment="kernel-syms less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062975" comment="kernel-trace-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062976" comment="kernel-trace-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062977" comment="kernel-trace less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062978" comment="kernel-vanilla-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062979" comment="kernel-vanilla-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062980" comment="kernel-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062981" comment="kernel-vmi-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062982" comment="kernel-vmi-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062983" comment="kernel-vmi less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062984" comment="kernel-xen-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062985" comment="kernel-xen-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062986" comment="kernel-xen less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062987" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.3-19.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062988" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.3-19.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3301</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3301" source="CVE"/>
	<description>
	The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register.  NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
	</description>
 </metadata>
<!-- 88444f657c04ca8cab3adb2bf83ec5f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062955" comment="kernel-debug-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062956" comment="kernel-debug-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062957" comment="kernel-debug less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062958" comment="kernel-default-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062959" comment="kernel-default-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062960" comment="kernel-default less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062961" comment="kernel-desktop-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062962" comment="kernel-desktop-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062963" comment="kernel-desktop less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062964" comment="kernel-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062965" comment="kernel-ec2-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062966" comment="kernel-ec2-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062967" comment="kernel-ec2-extra less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062968" comment="kernel-ec2 less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062969" comment="kernel-pae-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062970" comment="kernel-pae-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062971" comment="kernel-pae less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062972" comment="kernel-source-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062973" comment="kernel-source less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062974" comment="kernel-syms less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062975" comment="kernel-trace-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062976" comment="kernel-trace-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062977" comment="kernel-trace less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062978" comment="kernel-vanilla-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062979" comment="kernel-vanilla-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062980" comment="kernel-vanilla less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062981" comment="kernel-vmi-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062982" comment="kernel-vmi-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062983" comment="kernel-vmi less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062984" comment="kernel-xen-base less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062985" comment="kernel-xen-devel less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062986" comment="kernel-xen less than 2.6.34.7-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062987" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.3-19.1.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062988" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.3-19.1.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3304</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3304" source="CVE"/>
	<description>
	The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
	</description>
 </metadata>
<!-- be86c69e5fa10afc95539fde0801fe92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062806" comment="dovecot12-backend-mysql less than 1.2.11-3.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062807" comment="dovecot12-backend-pgsql less than 1.2.11-3.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062808" comment="dovecot12-backend-sqlite less than 1.2.11-3.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062809" comment="dovecot12-devel less than 1.2.11-3.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062810" comment="dovecot12-fts-lucene less than 1.2.11-3.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062811" comment="dovecot12-fts-solr less than 1.2.11-3.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062812" comment="dovecot12 less than 1.2.11-3.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3310</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310" source="CVE"/>
	<description>
	Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.
	</description>
 </metadata>
<!-- d0a7d8f91194d49d17006fb488ba2923 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063521" comment="kernel-debug-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063522" comment="kernel-debug-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063523" comment="kernel-debug less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063524" comment="kernel-default-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063525" comment="kernel-default-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063526" comment="kernel-default less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063527" comment="kernel-desktop-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063528" comment="kernel-desktop-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063529" comment="kernel-desktop less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063530" comment="kernel-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063531" comment="kernel-ec2-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063532" comment="kernel-ec2-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063533" comment="kernel-ec2-extra less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063534" comment="kernel-ec2 less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063535" comment="kernel-pae-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063536" comment="kernel-pae-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063537" comment="kernel-pae less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063538" comment="kernel-source-vanilla less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063539" comment="kernel-source less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063540" comment="kernel-syms less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063541" comment="kernel-trace-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063542" comment="kernel-trace-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063543" comment="kernel-trace less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063544" comment="kernel-vanilla-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063545" comment="kernel-vanilla-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063546" comment="kernel-vanilla less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063547" comment="kernel-vmi-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063548" comment="kernel-vmi-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063549" comment="kernel-vmi less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063550" comment="kernel-xen-base less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063551" comment="kernel-xen-devel less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063552" comment="kernel-xen less than 2.6.34.7-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063553" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.4-19.1.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063554" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.4-19.1.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
	<description>
	Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
	</description>
 </metadata>
<!-- 35cdbe0ae41b2eede7a95bdce718ab94 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063473" comment="freetype2-devel-32bit less than 2.3.12-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063474" comment="freetype2-devel less than 2.3.12-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063475" comment="libfreetype6-32bit less than 2.3.12-7.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063476" comment="libfreetype6 less than 2.3.12-7.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3312</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3312" source="CVE"/>
	<description>
	Epiphany 2.28 and 2.29, when WebKit and LibSoup are used, unconditionally displays a closed-lock icon for any URL beginning with the https: substring, without any warning to the user, which allows man-in-the-middle attackers to spoof arbitrary https web sites via a crafted X.509 server certificate.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3315</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3315" source="CVE"/>
	<description>
	authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.
	</description>
 </metadata>
<!-- 29aebe3c7ff3602bb896c4ba979c8d92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064963" comment="libsvn_auth_gnome_keyring-1-0 less than 1.6.9-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064964" comment="libsvn_auth_kwallet-1-0 less than 1.6.9-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064965" comment="subversion-devel less than 1.6.9-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064966" comment="subversion-perl less than 1.6.9-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064967" comment="subversion-python less than 1.6.9-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064968" comment="subversion-ruby less than 1.6.9-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064969" comment="subversion-server less than 1.6.9-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064970" comment="subversion-tools less than 1.6.9-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064971" comment="subversion less than 1.6.9-4.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3316</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3316" source="CVE"/>
	<description>
	The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.
	</description>
 </metadata>
<!-- dd8819840cc1b7ecfa0d007a01e84113 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071644" comment="pam-32bit less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071645" comment="pam-devel-32bit less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071646" comment="pam-devel less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071647" comment="pam-doc less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071648" comment="pam less than 1.1.1.90-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3432</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3432" source="CVE"/>
	<description>
	The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3433</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3433" source="CVE"/>
	<description>
	The PL/perl and PL/Tcl implementations in PostgreSQL 7.4 before 7.4.30, 8.0 before 8.0.26, 8.1 before 8.1.22, 8.2 before 8.2.18, 8.3 before 8.3.12, 8.4 before 8.4.5, and 9.0 before 9.0.1 do not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, as demonstrated by (1) redefining standard functions or (2) redefining operators, a different vulnerability than CVE-2010-1168, CVE-2010-1169, CVE-2010-1170, and CVE-2010-1447.
	</description>
 </metadata>
<!-- 2fb000c38a14a96b78e19a27a88b66f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063972" comment="postgresql-contrib less than 8.4.5-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063973" comment="postgresql-devel less than 8.4.5-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063974" comment="postgresql-docs less than 8.4.5-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063975" comment="postgresql-libs-32bit less than 8.4.5-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063976" comment="postgresql-libs less than 8.4.5-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063977" comment="postgresql-plperl less than 8.4.5-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063978" comment="postgresql-plpython less than 8.4.5-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063979" comment="postgresql-pltcl less than 8.4.5-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063980" comment="postgresql-server less than 8.4.5-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063981" comment="postgresql less than 8.4.5-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3434</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3434" source="CVE"/>
	<description>
	Buffer overflow in the find_stream_bounds function in pdf.c in libclamav in ClamAV before 0.96.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 77b995e1c29f7cb026d09f0aa06ad2b6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064073" comment="clamav-db less than 0.96.3-0.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064074" comment="clamav less than 0.96.3-0.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3437</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437" source="CVE"/>
	<description>
	Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3442</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3442" source="CVE"/>
	<description>
	Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3445</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3445" source="CVE"/>
	<description>
	Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x before 1.4.1 and 1.2.x before 1.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3450</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3450" source="CVE"/>
	<description>
	Multiple directory traversal vulnerabilities in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allow remote attackers to overwrite arbitrary files via a .. (dot dot) in an entry in (1) an XSLT JAR filter description file, (2) an Extension (aka OXT) file, or unspecified other (3) JAR or (4) ZIP files.
	</description>
 </metadata>
<!-- 738b6be686cb4004906408a9188c527a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3451</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3451" source="CVE"/>
	<description>
	Use-after-free vulnerability in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via malformed tables in an RTF document.
	</description>
 </metadata>
<!-- 738b6be686cb4004906408a9188c527a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3452</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3452" source="CVE"/>
	<description>
	Use-after-free vulnerability in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted tags in an RTF document.
	</description>
 </metadata>
<!-- 738b6be686cb4004906408a9188c527a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3453</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3453" source="CVE"/>
	<description>
	The WW8ListManager::WW8ListManager function in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle an unspecified number of list levels in user-defined list styles in WW8 data in a Microsoft Word document, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted .DOC file that triggers an out-of-bounds write.
	</description>
 </metadata>
<!-- 738b6be686cb4004906408a9188c527a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3454</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3454" source="CVE"/>
	<description>
	Multiple off-by-one errors in the WW8DopTypography::ReadFromMem function in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted typography information in a Microsoft Word .DOC file that triggers an out-of-bounds write.
	</description>
 </metadata>
<!-- 738b6be686cb4004906408a9188c527a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3476</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3476" source="CVE"/>
	<description>
	Open Ticket Request System (OTRS) 2.3.x before 2.3.6 and 2.4.x before 2.4.8 does not properly handle the matching of Perl regular expressions against HTML e-mail messages, which allows remote attackers to cause a denial of service (CPU consumption) via a large message, a different vulnerability than CVE-2010-2080.
	</description>
 </metadata>
<!-- 6ae4525d37f89e114dc1e7a02ed8875f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065175" comment="otrs-doc less than 2.4.9-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065176" comment="otrs-itsm less than 2.1.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065177" comment="otrs less than 2.4.9-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3493</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3493" source="CVE"/>
	<description>
	Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7, 3.1, and 3.2 alpha allow remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, or the getpeername function having an ENOTCONN error, a related issue to CVE-2010-3492.
	</description>
 </metadata>
<!-- ad68fb010e9d81ceb3f372a78dbc7bff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065040" comment="libpython2_6-1_0-32bit less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065041" comment="libpython2_6-1_0 less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065042" comment="python-32bit less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065043" comment="python-base-32bit less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065044" comment="python-base less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065045" comment="python-curses less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065046" comment="python-demo less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065047" comment="python-devel less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065048" comment="python-gdbm less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065049" comment="python-idle less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065050" comment="python-tk less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065051" comment="python-xml less than 2.6.5-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065052" comment="python less than 2.6.5-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3541</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3548</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Naming and Directory Interface (JNDI) component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to determine internal IP addresses or "otherwise-protected internal network names."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3549</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3550</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3550" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3551</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3552</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3552" source="CVE"/>
	<description>
	Unspecified vulnerability in the New Java Plug-in component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3553</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3554</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3554" source="CVE"/>
	<description>
	Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to "permissions granted to certain system objects."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3555</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3555" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that the ActiveX Plugin does not properly initialize an object field that is used as a window handle, which allows attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3556</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3556" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3557</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of "behavior and state of certain JDK classes" and "mutable static."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3558</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3558" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3559</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3559" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this involves an incorrect sign extension in the HeadspaceSoundbank.nGetName function, which allows attackers to execute arbitrary code via a crafted BANK record that leads to a buffer overflow.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3560</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3560" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3561</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3561" source="CVE"/>
	<description>
	Unspecified vulnerability in the CORBA component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this involves the use of the privileged accept method in the ServerSocket class, which does not limit which hosts can connect and allows remote attackers to bypass intended network access restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3562</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a double free vulnerability in IndexColorModel that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3563</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3563" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to "how Web Start retrieves security policies," BasicServiceImpl, and forged policies that bypass sandbox restrictions.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3564</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3564" source="CVE"/>
	<description>
	Unspecified vulnerability in the Oracle Communications Messaging Server (Sun Java System Messaging Server) component in Oracle Sun Products Suite 7.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Webmail.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that the Kerberos implementation does not properly check AP-REQ requests, which allows attackers to cause a denial of service in the JVM.  NOTE: CVE has not investigated the apparent discrepancy between the two vendors regarding the consequences of this issue.
	</description>
 </metadata>
<!-- 0fe727890fe34afac53580c5a6ff8598 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3565</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3566</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3566" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3567</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3567" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to a calculation error in right-to-left text character counts for the ICU OpenType font rendering implementation, which triggers an out-of-bounds memory access.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3568</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a race condition related to deserialization.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3569</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3570</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3570" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment Toolkit component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3571</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3571" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the color profile parser that allows remote attackers to execute arbitrary code via a crafted Tag structure in a color profile.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3572</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3572" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 491e1a7a67f05f9d95f281271c245d91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3573</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3574</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe727890fe34afac53580c5a6ff8598 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064419" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064420" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064421" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064422" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064423" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.1-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064424" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.1-0.2.2"/>
		</criteria>
	</criteria>
	<!-- 491e1a7a67f05f9d95f281271c245d91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063824" comment="java-1_6_0-sun-alsa less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063826" comment="java-1_6_0-sun-devel less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063827" comment="java-1_6_0-sun-jdbc less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063828" comment="java-1_6_0-sun-plugin less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063829" comment="java-1_6_0-sun-src less than 1.6.0.u22-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063830" comment="java-1_6_0-sun less than 1.6.0.u22-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3609</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609" source="CVE"/>
	<description>
	The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 6fb7a83d5fcc87c581df7d7143257642 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064537" comment="openslp-32bit less than 1.2.0-180.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064538" comment="openslp-devel less than 1.2.0-180.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064539" comment="openslp-server less than 1.2.0-180.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064540" comment="openslp less than 1.2.0-180.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3611</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3611" source="CVE"/>
	<description>
	ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.
	</description>
 </metadata>
<!-- 2da24e3bbb5469270a3f190f06fd54e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064252" comment="dhcp-client less than 4.1.1.P1-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064253" comment="dhcp-devel less than 4.1.1.P1-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064254" comment="dhcp-doc less than 4.1.1.P1-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064255" comment="dhcp-relay less than 4.1.1.P1-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064256" comment="dhcp-server less than 4.1.1.P1-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064257" comment="dhcp less than 4.1.1.P1-4.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3613</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613" source="CVE"/>
	<description>
	named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data.
	</description>
 </metadata>
<!-- dd2fde55a671248b9ce4a9045a9d6840 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064884" comment="bind-chrootenv less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064885" comment="bind-devel less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064886" comment="bind-doc less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064887" comment="bind-libs-32bit less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064888" comment="bind-libs less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064889" comment="bind-utils less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064890" comment="bind less than 9.7.1P2-0.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3614</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614" source="CVE"/>
	<description>
	named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3, 9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which might allow remote attackers to cause a denial of service (DNSSEC validation error) by triggering a rollover.
	</description>
 </metadata>
<!-- dd2fde55a671248b9ce4a9045a9d6840 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064884" comment="bind-chrootenv less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064885" comment="bind-devel less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064886" comment="bind-doc less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064887" comment="bind-libs-32bit less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064888" comment="bind-libs less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064889" comment="bind-utils less than 9.7.1P2-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064890" comment="bind less than 9.7.1P2-0.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3619</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3619" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3620</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3620" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3629.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3621</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3621" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3622, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3622</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3622" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3628, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3623</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3623" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3624</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3624" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allows attackers to execute arbitrary code via a crafted image.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3625</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3625" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code via unspecified vectors, related to a "prefix protocol handler vulnerability."
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3626</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3626" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted font, a different vulnerability than CVE-2010-2889.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3627</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3627" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3628</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3628" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3632, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3629</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3629" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to execute arbitrary code via a crafted image, a different vulnerability than CVE-2010-3620.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3630</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3630" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3631</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3631" source="CVE"/>
	<description>
	Array index error in Adobe Reader and Acrobat 8.x before 8.2.5 and 9.x before 9.4 on Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3632</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3632" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, and CVE-2010-3658.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3636</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3636" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, does not properly handle unspecified encodings during the parsing of a cross-domain policy file, which allows remote web servers to bypass intended access restrictions via unknown vectors.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3637</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3637" source="CVE"/>
	<description>
	An unspecified ActiveX control in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 (Flash10h.ocx) on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted FLV video.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3638</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3638" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Mac OS X, when Safari is used, allows attackers to obtain sensitive information via unknown vectors.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3639</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3639" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3640</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3640" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3641</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3641" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3642</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3642" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3643</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3643" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3644</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3644" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3645</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3645" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3646</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3646" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3647</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3647" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3648</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3648" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3649</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3649" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3650, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3650</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3650" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3652.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3651</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3651" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3652</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3652" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, and CVE-2010-3650.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3654</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3654" source="CVE"/>
	<description>
	Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris and 10.1.95.1 on Android, and authplay.dll (aka AuthPlayLib.bundle or libauthplay.so.0.0.0) in Adobe Reader and Acrobat 9.x through 9.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted SWF content, as exploited in the wild in October 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118393cb5d6c5eb8b87532b448eb409e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
	</criteria>
	<!-- 82eec958a08d3fc6d0b6d3f26f80f91b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064862" comment="acroread less than 9.4.1-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3656</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3656" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3657.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3657</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3657" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows attackers to cause a denial of service via unknown vectors, a different vulnerability than CVE-2010-3656.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3658</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3658" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2890, CVE-2010-3619, CVE-2010-3621, CVE-2010-3622, CVE-2010-3628, and CVE-2010-3632.
	</description>
 </metadata>
<!-- eed8891c855fdc5625db820413b29d27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063368" comment="acroread less than 9.4-0.1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3689</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3689" source="CVE"/>
	<description>
	soffice in OpenOffice.org (OOo) 3.x before 3.3 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
	</description>
 </metadata>
<!-- 738b6be686cb4004906408a9188c527a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3699</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3699" source="CVE"/>
	<description>
	The backend driver in Xen 3.x allows guest OS users to cause a denial of service via a kernel thread leak, which prevents the device and guest OS from being shut down or create a zombie domain, causes a hang in zenwatch, or prevents unspecified xm commands from working properly, related to (1) netback, (2) blkback, or (3) blktap.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3702</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702" source="CVE"/>
	<description>
	The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 493a198dbf19a2b40479e5345b5869cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064477" comment="libpoppler-devel less than 0.12.3-5.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064478" comment="libpoppler-doc less than 0.12.3-5.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064479" comment="libpoppler-glib-devel less than 0.12.3-5.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064480" comment="libpoppler-glib4 less than 0.12.3-5.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064481" comment="libpoppler5 less than 0.12.3-5.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064482" comment="poppler-tools less than 0.12.3-5.1.1"/>
		</criteria>
	</criteria>
	<!-- 738b6be686cb4004906408a9188c527a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3703</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703" source="CVE"/>
	<description>
	The PostScriptFunction::PostScriptFunction function in poppler/Function.cc in the PDF parser in poppler 0.8.7 and possibly other versions up to 0.15.1, and possibly other products, allows context-dependent attackers to cause a denial of service (crash) via a PDF file that triggers an uninitialized pointer dereference.
	</description>
 </metadata>
<!-- 493a198dbf19a2b40479e5345b5869cb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064477" comment="libpoppler-devel less than 0.12.3-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064478" comment="libpoppler-doc less than 0.12.3-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064479" comment="libpoppler-glib-devel less than 0.12.3-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064480" comment="libpoppler-glib4 less than 0.12.3-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064481" comment="libpoppler5 less than 0.12.3-5.1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064482" comment="poppler-tools less than 0.12.3-5.1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3704</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704" source="CVE"/>
	<description>
	The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 493a198dbf19a2b40479e5345b5869cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064477" comment="libpoppler-devel less than 0.12.3-5.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064478" comment="libpoppler-doc less than 0.12.3-5.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064479" comment="libpoppler-glib-devel less than 0.12.3-5.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064480" comment="libpoppler-glib4 less than 0.12.3-5.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064481" comment="libpoppler5 less than 0.12.3-5.1.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064482" comment="poppler-tools less than 0.12.3-5.1.1"/>
		</criteria>
	</criteria>
	<!-- 738b6be686cb4004906408a9188c527a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3705</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705" source="CVE"/>
	<description>
	The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3706</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3706" source="CVE"/>
	<description>
	plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
	</description>
 </metadata>
<!-- 01f09f7b7dc23fe6ed391417ff93c814 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064089" comment="dovecot12-backend-mysql less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064090" comment="dovecot12-backend-pgsql less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064091" comment="dovecot12-backend-sqlite less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064092" comment="dovecot12-devel less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064093" comment="dovecot12-fts-lucene less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064094" comment="dovecot12-fts-solr less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064095" comment="dovecot12 less than 1.2.11-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3707</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3707" source="CVE"/>
	<description>
	plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
	</description>
 </metadata>
<!-- 01f09f7b7dc23fe6ed391417ff93c814 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064089" comment="dovecot12-backend-mysql less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064090" comment="dovecot12-backend-pgsql less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064091" comment="dovecot12-backend-sqlite less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064092" comment="dovecot12-devel less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064093" comment="dovecot12-fts-lucene less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064094" comment="dovecot12-fts-solr less than 1.2.11-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064095" comment="dovecot12 less than 1.2.11-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3709</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3709" source="CVE"/>
	<description>
	The ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ZIP archive.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3710</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3710" source="CVE"/>
	<description>
	Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.
	</description>
 </metadata>
<!-- 8107cbeafc0794f40711a2548bab0d60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064658" comment="apache2-mod_php5 less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064659" comment="php5-bcmath less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064660" comment="php5-bz2 less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064661" comment="php5-calendar less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064662" comment="php5-ctype less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064663" comment="php5-curl less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064664" comment="php5-dba less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064665" comment="php5-devel less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064666" comment="php5-dom less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064667" comment="php5-enchant less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064668" comment="php5-exif less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064669" comment="php5-fastcgi less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064670" comment="php5-fileinfo less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064671" comment="php5-ftp less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064672" comment="php5-gd less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064673" comment="php5-gettext less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064674" comment="php5-gmp less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064675" comment="php5-hash less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064676" comment="php5-iconv less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064677" comment="php5-imap less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064678" comment="php5-intl less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064679" comment="php5-json less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064680" comment="php5-ldap less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064681" comment="php5-mbstring less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064682" comment="php5-mcrypt less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064683" comment="php5-mysql less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064684" comment="php5-odbc less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064685" comment="php5-openssl less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064686" comment="php5-pcntl less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064687" comment="php5-pdo less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064688" comment="php5-pear less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064689" comment="php5-pgsql less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064690" comment="php5-phar less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064691" comment="php5-posix less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064692" comment="php5-pspell less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064693" comment="php5-readline less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064694" comment="php5-shmop less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064695" comment="php5-snmp less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064696" comment="php5-soap less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064697" comment="php5-sockets less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064698" comment="php5-sqlite less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064699" comment="php5-suhosin less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064700" comment="php5-sysvmsg less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064701" comment="php5-sysvsem less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064702" comment="php5-sysvshm less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064703" comment="php5-tidy less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064704" comment="php5-tokenizer less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064705" comment="php5-wddx less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064706" comment="php5-xmlreader less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064707" comment="php5-xmlrpc less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064708" comment="php5-xmlwriter less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064709" comment="php5-xsl less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064710" comment="php5-zip less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064711" comment="php5-zlib less than 5.3.3-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3718</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3718" source="CVE"/>
	<description>
	Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
	</description>
 </metadata>
<!-- 05603f3a64fc81196dd8aea9696233f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065925" comment="tomcat6-admin-webapps less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065926" comment="tomcat6-docs-webapp less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065927" comment="tomcat6-el-1_0-api less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065928" comment="tomcat6-javadoc less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065929" comment="tomcat6-jsp-2_1-api less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065930" comment="tomcat6-lib less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065931" comment="tomcat6-servlet-2_5-api less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065932" comment="tomcat6-webapps less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065933" comment="tomcat6 less than 6.0.24-5.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3765</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765" source="CVE"/>
	<description>
	Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03673ac1b3c574b9c9caadfdf8cdba6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064120" comment="seamonkey-dom-inspector less than 2.0.10-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064121" comment="seamonkey-irc less than 2.0.10-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064128" comment="seamonkey-translations-common less than 2.0.10-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064129" comment="seamonkey-translations-other less than 2.0.10-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064122" comment="seamonkey-venkman less than 2.0.10-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064123" comment="seamonkey less than 2.0.10-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 400c9eb6f9b1dc3382521accd699c8e1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064124" comment="MozillaThunderbird-devel less than 3.0.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064125" comment="MozillaThunderbird-translations-common less than 3.0.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064126" comment="MozillaThunderbird-translations-other less than 3.0.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064127" comment="MozillaThunderbird less than 3.0.10-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064130" comment="enigmail less than 1.0.1-4.3.1"/>
		</criteria>
	</criteria>
	<!-- aee536ea9ad121d2314cd1c9a3cb8cec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064104" comment="MozillaFirefox-branding-upstream less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064105" comment="MozillaFirefox-translations-common less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064106" comment="MozillaFirefox-translations-other less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064107" comment="MozillaFirefox less than 3.6.12-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064108" comment="mozilla-js192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064109" comment="mozilla-js192 less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064110" comment="mozilla-xulrunner192-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064112" comment="mozilla-xulrunner192-devel less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064114" comment="mozilla-xulrunner192-gnome less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064115" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064116" comment="mozilla-xulrunner192-translations-common less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064117" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064118" comment="mozilla-xulrunner192-translations-other less than 1.9.2.12-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064119" comment="mozilla-xulrunner192 less than 1.9.2.12-0.8.1"/>
		</criteria>
	</criteria>
	<!-- b79d68aabb060f483bf1161706a44705 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064096" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064097" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064098" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064099" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064100" comment="mozilla-xulrunner191-translations-common less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064101" comment="mozilla-xulrunner191-translations-other less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064102" comment="mozilla-xulrunner191 less than 1.9.1.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064103" comment="python-xpcom191 less than 1.9.1.15-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3766</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3766" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via vectors involving a change to an nsDOMAttribute node.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3767</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3767" source="CVE"/>
	<description>
	Integer overflow in the NewIdArray function in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via a JavaScript array with many elements.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3768</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3768" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 do not properly validate downloadable fonts before use within an operating system's font implementation, which allows remote attackers to execute arbitrary code via vectors related to @font-face Cascading Style Sheets (CSS) rules.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3769</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3769" source="CVE"/>
	<description>
	The line-breaking implementation in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 on Windows does not properly handle long strings, which allows remote attackers to execute arbitrary code via a crafted document.write call that triggers a buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3770</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3770" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the rendering engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allow remote attackers to inject arbitrary web script or HTML via (1) x-mac-arabic, (2) x-mac-farsi, or (3) x-mac-hebrew characters that may be converted to angle brackets during rendering.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3771</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3771" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle injection of an ISINDEX element into an about:blank page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to redirection to a chrome: URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3772</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3772" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly calculate index values for certain child content in a XUL tree, which allows remote attackers to execute arbitrary code via vectors involving a DIV element within a treechildren element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3773</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3773" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-0179.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3774</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3774" source="CVE"/>
	<description>
	The NS_SecurityCompareURIs function in netwerk/base/public/nsNetUtil.h in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle (1) about:neterror and (2) about:certerror pages, which allows remote attackers to spoof the location bar via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3775</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3775" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle certain redirections involving data: URLs and Java LiveConnect scripts, which allows remote attackers to start processes, read arbitrary local files, and establish network connections via vectors involving a refresh value in the http-equiv attribute of a META element, which causes the wrong security principal to be used.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3776</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3776" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3777</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3777" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox 3.6.x before 3.6.13 and Thunderbird 3.1.x before 3.1.7 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3778</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3778" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox 3.5.x before 3.5.16, Thunderbird before 3.0.11, and SeaMonkey before 2.0.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b3d59e8ef2d2775a4a5ef278f8328561 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065080" comment="MozillaThunderbird-devel less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065081" comment="MozillaThunderbird-translations-common less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065082" comment="MozillaThunderbird-translations-other less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065083" comment="MozillaThunderbird less than 3.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065102" comment="enigmail less than 1.0.1-4.5.1"/>
		</criteria>
	</criteria>
	<!-- c6993d092ea2f869e39d828df8700dae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065226" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065227" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065228" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065229" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065230" comment="mozilla-xulrunner191-translations-common less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065231" comment="mozilla-xulrunner191-translations-other less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065232" comment="mozilla-xulrunner191 less than 1.9.1.16-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065233" comment="python-xpcom191 less than 1.9.1.16-0.2.1"/>
		</criteria>
	</criteria>
	<!-- c98375ad9d4dcd528f0e708858d60d22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065234" comment="MozillaFirefox-branding-upstream less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065235" comment="MozillaFirefox-translations-common less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065236" comment="MozillaFirefox-translations-other less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065237" comment="MozillaFirefox less than 3.6.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065238" comment="mozilla-js192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065239" comment="mozilla-js192 less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065240" comment="mozilla-xulrunner192-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065241" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065242" comment="mozilla-xulrunner192-devel less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065243" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065244" comment="mozilla-xulrunner192-gnome less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065245" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065246" comment="mozilla-xulrunner192-translations-common less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065247" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065248" comment="mozilla-xulrunner192-translations-other less than 1.9.2.13-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065249" comment="mozilla-xulrunner192 less than 1.9.2.13-0.2.1"/>
		</criteria>
	</criteria>
	<!-- fb18b665e26e4644e88e94c322179fd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065085" comment="seamonkey-dom-inspector less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065086" comment="seamonkey-irc less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065103" comment="seamonkey-translations-common less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065104" comment="seamonkey-translations-other less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065087" comment="seamonkey-venkman less than 2.0.11-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065088" comment="seamonkey less than 2.0.11-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3803</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3803" source="CVE"/>
	<description>
	Integer overflow in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3804</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3804" source="CVE"/>
	<description>
	The JavaScript implementation in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, uses a weak algorithm for generating values of random numbers, which makes it easier for remote attackers to track a user by predicting a value, a related issue to CVE-2008-5913 and CVE-2010-3171.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3805</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3805" source="CVE"/>
	<description>
	Integer underflow in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving WebSockets.  NOTE: this may overlap CVE-2010-3254.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3808</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3808" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, does not properly perform a cast of an unspecified variable during processing of editing commands, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3809</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3809" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, does not properly perform a cast of an unspecified variable during processing of inline styling, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3810</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3810" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, does not properly handle the History object, which allows remote attackers to spoof the location bar's URL or add URLs to the history via a cross-origin attack.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3811</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3811" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving element attributes.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3812</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3812" source="CVE"/>
	<description>
	Integer overflow in the Text::wholeText method in dom/Text.cpp in WebKit, as used in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4; webkitgtk before 1.2.6; and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving Text objects.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3813</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3813" source="CVE"/>
	<description>
	The WebCore::HTMLLinkElement::process function in WebCore/html/HTMLLinkElement.cpp in WebKit, as used in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4; webkitgtk before 1.2.6; and possibly other products does not verify whether DNS prefetching is enabled when processing an HTML LINK element, which allows remote attackers to bypass intended access restrictions, as demonstrated by an HTML e-mail message that uses a LINK element for X-Confirm-Reading-To functionality.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3814</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.
	</description>
 </metadata>
<!-- 7aa8628e4c44ab9cb2d628abeb410c30 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067744" comment="freetype2-devel-32bit less than 2.3.12-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067745" comment="freetype2-devel less than 2.3.12-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067746" comment="libfreetype6-32bit less than 2.3.12-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067747" comment="libfreetype6 less than 2.3.12-7.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3816</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3816" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving scrollbars.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3817</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3817" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, does not properly perform a cast of an unspecified variable during processing of Cascading Style Sheets (CSS) 3D transforms, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3818</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3818" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving inline text boxes.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3819</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3819" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, does not properly perform a cast of an unspecified variable during processing of Cascading Style Sheets (CSS) boxes, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3820</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3820" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, accesses uninitialized memory during processing of editable elements, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3821</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3821" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, does not properly handle the :first-letter pseudo-element in a Cascading Style Sheets (CSS) token sequence, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3822</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3822" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, accesses an uninitialized pointer during processing of Cascading Style Sheets (CSS) counter styles, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3823</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3823" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving Geolocation objects.  NOTE: this might overlap CVE-2010-3415.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3824</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3824" source="CVE"/>
	<description>
	Use-after-free vulnerability in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving SVG use elements.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3826</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3826" source="CVE"/>
	<description>
	WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, does not properly perform a cast of an unspecified variable during processing of colors in an SVG document, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3829</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3829" source="CVE"/>
	<description>
	WebKit in Apple iOS before 4.2 allows remote attackers to bypass the remote image loading setting in Mail via an HTML LINK element with a DNS prefetching property, as demonstrated by an HTML e-mail message that uses a LINK element for X-Confirm-Reading-To functionality, a related issue to CVE-2010-3813.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3833</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3833" source="CVE"/>
	<description>
	MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a "CREATE TABLE ... SELECT."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19b0366309df3dcc567dd12b843ef720 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069350" comment="libmysqlclusterclient16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069351" comment="libmysqlclusterclient_r16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069352" comment="mysql-cluster-bench less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069353" comment="mysql-cluster-client less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069354" comment="mysql-cluster-debug less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069355" comment="mysql-cluster-ndb-extra less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069356" comment="mysql-cluster-ndb-management less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069357" comment="mysql-cluster-ndb-storage less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069358" comment="mysql-cluster-ndb-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069359" comment="mysql-cluster-test less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069360" comment="mysql-cluster-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069361" comment="mysql-cluster less than 7.0.25-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 21c4f0d790794077ca4e3134888adb8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069332" comment="libmariadbclient16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069333" comment="libmariadbclient_r16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069334" comment="mariadb-bench less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069335" comment="mariadb-client less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069336" comment="mariadb-debug less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069337" comment="mariadb-test less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069338" comment="mariadb-tools less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069339" comment="mariadb less than 5.1.55-0.3.1"/>
		</criteria>
	</criteria>
	<!-- b301b1dafddb149d4a540487e48d3b81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071904" comment="libmysqlclient-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071905" comment="libmysqlclient16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071906" comment="libmysqlclient16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071907" comment="libmysqlclient_r16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071908" comment="libmysqlclient_r16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071909" comment="libmysqld-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071910" comment="libmysqld0 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071911" comment="mysql-community-server-bench less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071912" comment="mysql-community-server-client less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071913" comment="mysql-community-server-debug less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071914" comment="mysql-community-server-test less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071915" comment="mysql-community-server-tools less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071916" comment="mysql-community-server less than 5.1.57-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3834</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3834" source="CVE"/>
	<description>
	Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19b0366309df3dcc567dd12b843ef720 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069350" comment="libmysqlclusterclient16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069351" comment="libmysqlclusterclient_r16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069352" comment="mysql-cluster-bench less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069353" comment="mysql-cluster-client less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069354" comment="mysql-cluster-debug less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069355" comment="mysql-cluster-ndb-extra less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069356" comment="mysql-cluster-ndb-management less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069357" comment="mysql-cluster-ndb-storage less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069358" comment="mysql-cluster-ndb-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069359" comment="mysql-cluster-test less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069360" comment="mysql-cluster-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069361" comment="mysql-cluster less than 7.0.25-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 21c4f0d790794077ca4e3134888adb8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069332" comment="libmariadbclient16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069333" comment="libmariadbclient_r16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069334" comment="mariadb-bench less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069335" comment="mariadb-client less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069336" comment="mariadb-debug less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069337" comment="mariadb-test less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069338" comment="mariadb-tools less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069339" comment="mariadb less than 5.1.55-0.3.1"/>
		</criteria>
	</criteria>
	<!-- b301b1dafddb149d4a540487e48d3b81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071904" comment="libmysqlclient-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071905" comment="libmysqlclient16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071906" comment="libmysqlclient16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071907" comment="libmysqlclient_r16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071908" comment="libmysqlclient_r16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071909" comment="libmysqld-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071910" comment="libmysqld0 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071911" comment="mysql-community-server-bench less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071912" comment="mysql-community-server-client less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071913" comment="mysql-community-server-debug less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071914" comment="mysql-community-server-test less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071915" comment="mysql-community-server-tools less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071916" comment="mysql-community-server less than 5.1.57-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3835</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3835" source="CVE"/>
	<description>
	MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19b0366309df3dcc567dd12b843ef720 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069350" comment="libmysqlclusterclient16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069351" comment="libmysqlclusterclient_r16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069352" comment="mysql-cluster-bench less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069353" comment="mysql-cluster-client less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069354" comment="mysql-cluster-debug less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069355" comment="mysql-cluster-ndb-extra less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069356" comment="mysql-cluster-ndb-management less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069357" comment="mysql-cluster-ndb-storage less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069358" comment="mysql-cluster-ndb-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069359" comment="mysql-cluster-test less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069360" comment="mysql-cluster-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069361" comment="mysql-cluster less than 7.0.25-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 21c4f0d790794077ca4e3134888adb8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069332" comment="libmariadbclient16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069333" comment="libmariadbclient_r16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069334" comment="mariadb-bench less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069335" comment="mariadb-client less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069336" comment="mariadb-debug less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069337" comment="mariadb-test less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069338" comment="mariadb-tools less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069339" comment="mariadb less than 5.1.55-0.3.1"/>
		</criteria>
	</criteria>
	<!-- b301b1dafddb149d4a540487e48d3b81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071904" comment="libmysqlclient-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071905" comment="libmysqlclient16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071906" comment="libmysqlclient16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071907" comment="libmysqlclient_r16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071908" comment="libmysqlclient_r16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071909" comment="libmysqld-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071910" comment="libmysqld0 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071911" comment="mysql-community-server-bench less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071912" comment="mysql-community-server-client less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071913" comment="mysql-community-server-debug less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071914" comment="mysql-community-server-test less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071915" comment="mysql-community-server-tools less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071916" comment="mysql-community-server less than 5.1.57-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3836</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3836" source="CVE"/>
	<description>
	MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19b0366309df3dcc567dd12b843ef720 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069350" comment="libmysqlclusterclient16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069351" comment="libmysqlclusterclient_r16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069352" comment="mysql-cluster-bench less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069353" comment="mysql-cluster-client less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069354" comment="mysql-cluster-debug less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069355" comment="mysql-cluster-ndb-extra less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069356" comment="mysql-cluster-ndb-management less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069357" comment="mysql-cluster-ndb-storage less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069358" comment="mysql-cluster-ndb-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069359" comment="mysql-cluster-test less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069360" comment="mysql-cluster-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069361" comment="mysql-cluster less than 7.0.25-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 21c4f0d790794077ca4e3134888adb8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069332" comment="libmariadbclient16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069333" comment="libmariadbclient_r16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069334" comment="mariadb-bench less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069335" comment="mariadb-client less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069336" comment="mariadb-debug less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069337" comment="mariadb-test less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069338" comment="mariadb-tools less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069339" comment="mariadb less than 5.1.55-0.3.1"/>
		</criteria>
	</criteria>
	<!-- b301b1dafddb149d4a540487e48d3b81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071904" comment="libmysqlclient-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071905" comment="libmysqlclient16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071906" comment="libmysqlclient16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071907" comment="libmysqlclient_r16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071908" comment="libmysqlclient_r16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071909" comment="libmysqld-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071910" comment="libmysqld0 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071911" comment="mysql-community-server-bench less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071912" comment="mysql-community-server-client less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071913" comment="mysql-community-server-debug less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071914" comment="mysql-community-server-test less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071915" comment="mysql-community-server-tools less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071916" comment="mysql-community-server less than 5.1.57-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3837</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3837" source="CVE"/>
	<description>
	MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19b0366309df3dcc567dd12b843ef720 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069350" comment="libmysqlclusterclient16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069351" comment="libmysqlclusterclient_r16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069352" comment="mysql-cluster-bench less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069353" comment="mysql-cluster-client less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069354" comment="mysql-cluster-debug less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069355" comment="mysql-cluster-ndb-extra less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069356" comment="mysql-cluster-ndb-management less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069357" comment="mysql-cluster-ndb-storage less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069358" comment="mysql-cluster-ndb-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069359" comment="mysql-cluster-test less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069360" comment="mysql-cluster-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069361" comment="mysql-cluster less than 7.0.25-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 21c4f0d790794077ca4e3134888adb8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069332" comment="libmariadbclient16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069333" comment="libmariadbclient_r16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069334" comment="mariadb-bench less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069335" comment="mariadb-client less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069336" comment="mariadb-debug less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069337" comment="mariadb-test less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069338" comment="mariadb-tools less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069339" comment="mariadb less than 5.1.55-0.3.1"/>
		</criteria>
	</criteria>
	<!-- b301b1dafddb149d4a540487e48d3b81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071904" comment="libmysqlclient-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071905" comment="libmysqlclient16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071906" comment="libmysqlclient16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071907" comment="libmysqlclient_r16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071908" comment="libmysqlclient_r16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071909" comment="libmysqld-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071910" comment="libmysqld0 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071911" comment="mysql-community-server-bench less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071912" comment="mysql-community-server-client less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071913" comment="mysql-community-server-debug less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071914" comment="mysql-community-server-test less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071915" comment="mysql-community-server-tools less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071916" comment="mysql-community-server less than 5.1.57-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3838</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3838" source="CVE"/>
	<description>
	MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is "processed using an intermediate temporary table."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19b0366309df3dcc567dd12b843ef720 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069350" comment="libmysqlclusterclient16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069351" comment="libmysqlclusterclient_r16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069352" comment="mysql-cluster-bench less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069353" comment="mysql-cluster-client less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069354" comment="mysql-cluster-debug less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069355" comment="mysql-cluster-ndb-extra less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069356" comment="mysql-cluster-ndb-management less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069357" comment="mysql-cluster-ndb-storage less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069358" comment="mysql-cluster-ndb-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069359" comment="mysql-cluster-test less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069360" comment="mysql-cluster-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069361" comment="mysql-cluster less than 7.0.25-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 21c4f0d790794077ca4e3134888adb8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069332" comment="libmariadbclient16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069333" comment="libmariadbclient_r16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069334" comment="mariadb-bench less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069335" comment="mariadb-client less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069336" comment="mariadb-debug less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069337" comment="mariadb-test less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069338" comment="mariadb-tools less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069339" comment="mariadb less than 5.1.55-0.3.1"/>
		</criteria>
	</criteria>
	<!-- b301b1dafddb149d4a540487e48d3b81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071904" comment="libmysqlclient-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071905" comment="libmysqlclient16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071906" comment="libmysqlclient16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071907" comment="libmysqlclient_r16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071908" comment="libmysqlclient_r16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071909" comment="libmysqld-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071910" comment="libmysqld0 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071911" comment="mysql-community-server-bench less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071912" comment="mysql-community-server-client less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071913" comment="mysql-community-server-debug less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071914" comment="mysql-community-server-test less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071915" comment="mysql-community-server-tools less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071916" comment="mysql-community-server less than 5.1.57-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3839</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3839" source="CVE"/>
	<description>
	MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19b0366309df3dcc567dd12b843ef720 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069350" comment="libmysqlclusterclient16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069351" comment="libmysqlclusterclient_r16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069352" comment="mysql-cluster-bench less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069353" comment="mysql-cluster-client less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069354" comment="mysql-cluster-debug less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069355" comment="mysql-cluster-ndb-extra less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069356" comment="mysql-cluster-ndb-management less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069357" comment="mysql-cluster-ndb-storage less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069358" comment="mysql-cluster-ndb-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069359" comment="mysql-cluster-test less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069360" comment="mysql-cluster-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069361" comment="mysql-cluster less than 7.0.25-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 21c4f0d790794077ca4e3134888adb8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069332" comment="libmariadbclient16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069333" comment="libmariadbclient_r16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069334" comment="mariadb-bench less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069335" comment="mariadb-client less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069336" comment="mariadb-debug less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069337" comment="mariadb-test less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069338" comment="mariadb-tools less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069339" comment="mariadb less than 5.1.55-0.3.1"/>
		</criteria>
	</criteria>
	<!-- b301b1dafddb149d4a540487e48d3b81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071904" comment="libmysqlclient-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071905" comment="libmysqlclient16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071906" comment="libmysqlclient16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071907" comment="libmysqlclient_r16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071908" comment="libmysqlclient_r16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071909" comment="libmysqld-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071910" comment="libmysqld0 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071911" comment="mysql-community-server-bench less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071912" comment="mysql-community-server-client less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071913" comment="mysql-community-server-debug less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071914" comment="mysql-community-server-test less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071915" comment="mysql-community-server-tools less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071916" comment="mysql-community-server less than 5.1.57-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3840</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3840" source="CVE"/>
	<description>
	The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19b0366309df3dcc567dd12b843ef720 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069350" comment="libmysqlclusterclient16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069351" comment="libmysqlclusterclient_r16 less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069352" comment="mysql-cluster-bench less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069353" comment="mysql-cluster-client less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069354" comment="mysql-cluster-debug less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069355" comment="mysql-cluster-ndb-extra less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069356" comment="mysql-cluster-ndb-management less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069357" comment="mysql-cluster-ndb-storage less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069358" comment="mysql-cluster-ndb-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069359" comment="mysql-cluster-test less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069360" comment="mysql-cluster-tools less than 7.0.25-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069361" comment="mysql-cluster less than 7.0.25-0.3.1"/>
		</criteria>
	</criteria>
	<!-- 21c4f0d790794077ca4e3134888adb8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069332" comment="libmariadbclient16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069333" comment="libmariadbclient_r16 less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069334" comment="mariadb-bench less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069335" comment="mariadb-client less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069336" comment="mariadb-debug less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069337" comment="mariadb-test less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069338" comment="mariadb-tools less than 5.1.55-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069339" comment="mariadb less than 5.1.55-0.3.1"/>
		</criteria>
	</criteria>
	<!-- b301b1dafddb149d4a540487e48d3b81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071904" comment="libmysqlclient-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071905" comment="libmysqlclient16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071906" comment="libmysqlclient16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071907" comment="libmysqlclient_r16-32bit less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071908" comment="libmysqlclient_r16 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071909" comment="libmysqld-devel less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071910" comment="libmysqld0 less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071911" comment="mysql-community-server-bench less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071912" comment="mysql-community-server-client less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071913" comment="mysql-community-server-debug less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071914" comment="mysql-community-server-test less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071915" comment="mysql-community-server-tools less than 5.1.57-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071916" comment="mysql-community-server less than 5.1.57-0.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3847</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847" source="CVE"/>
	<description>
	elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
	</description>
 </metadata>
<!-- 0b962449ffd0f93f559ee9fddf37e9fd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063982" comment="glibc-32bit less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063983" comment="glibc-devel-32bit less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063984" comment="glibc-devel less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063985" comment="glibc-html less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063986" comment="glibc-i18ndata less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063987" comment="glibc-info less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063988" comment="glibc-locale-32bit less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063989" comment="glibc-locale less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063990" comment="glibc-obsolete less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063991" comment="glibc-profile-32bit less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063992" comment="glibc-profile less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063993" comment="glibc less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063994" comment="nscd less than 2.11.2-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3848</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3848" source="CVE"/>
	<description>
	Stack-based buffer overflow in the econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to gain privileges by providing a large number of iovec structures.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3849</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3849" source="CVE"/>
	<description>
	The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a sendmsg call that specifies a NULL value for the remote address field.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3850</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3850" source="CVE"/>
	<description>
	The ec_dev_ioctl function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2 does not require the CAP_NET_ADMIN capability, which allows local users to bypass intended access restrictions and configure econet addresses via an SIOCSIFADDR ioctl call.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3855</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855" source="CVE"/>
	<description>
	Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.
	</description>
 </metadata>
<!-- 7aa8628e4c44ab9cb2d628abeb410c30 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067744" comment="freetype2-devel-32bit less than 2.3.12-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067745" comment="freetype2-devel less than 2.3.12-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067746" comment="libfreetype6-32bit less than 2.3.12-7.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067747" comment="libfreetype6 less than 2.3.12-7.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3856</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856" source="CVE"/>
	<description>
	ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
	</description>
 </metadata>
<!-- 0b962449ffd0f93f559ee9fddf37e9fd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063982" comment="glibc-32bit less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063983" comment="glibc-devel-32bit less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063984" comment="glibc-devel less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063985" comment="glibc-html less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063986" comment="glibc-i18ndata less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063987" comment="glibc-info less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063988" comment="glibc-locale-32bit less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063989" comment="glibc-locale less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063990" comment="glibc-obsolete less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063991" comment="glibc-profile-32bit less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063992" comment="glibc-profile less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063993" comment="glibc less than 2.11.2-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063994" comment="nscd less than 2.11.2-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3858</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3858" source="CVE"/>
	<description>
	The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit platform, which allows local users to cause a denial of service (system crash) via a crafted exec system call, a related issue to CVE-2010-2240.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3860</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3860" source="CVE"/>
	<description>
	IcedTea 1.7.x before 1.7.6, 1.8.x before 1.8.3, and 1.9.x before 1.9.2, as based on OpenJDK 6, declares multiple sensitive variables as public, which allows remote attackers to obtain sensitive information including (1) user.name, (2) user.home, and (3) java.home system properties, and other sensitive information such as installation directories.
	</description>
 </metadata>
<!-- ee6b5b7a363e1901fa4a8a9786cb015e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064793" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064794" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064795" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064796" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064797" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.2-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064798" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.2-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3861</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3861" source="CVE"/>
	<description>
	The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3864</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864" source="CVE"/>
	<description>
	Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
	</description>
 </metadata>
<!-- 9158011dd1faa1a82705320cfb105e5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064449" comment="libopenssl-devel less than 1.0.0-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064450" comment="libopenssl0_9_8-32bit less than 0.9.8m-3.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064451" comment="libopenssl0_9_8 less than 0.9.8m-3.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064452" comment="libopenssl1_0_0-32bit less than 1.0.0-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064453" comment="libopenssl1_0_0 less than 1.0.0-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064454" comment="openssl-doc less than 1.0.0-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064455" comment="openssl less than 1.0.0-6.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3865</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3865" source="CVE"/>
	<description>
	Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3870</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3870" source="CVE"/>
	<description>
	The utf8_decode function in PHP before 5.3.4 does not properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data, which makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string.
	</description>
 </metadata>
<!-- 8107cbeafc0794f40711a2548bab0d60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064658" comment="apache2-mod_php5 less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064659" comment="php5-bcmath less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064660" comment="php5-bz2 less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064661" comment="php5-calendar less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064662" comment="php5-ctype less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064663" comment="php5-curl less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064664" comment="php5-dba less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064665" comment="php5-devel less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064666" comment="php5-dom less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064667" comment="php5-enchant less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064668" comment="php5-exif less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064669" comment="php5-fastcgi less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064670" comment="php5-fileinfo less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064671" comment="php5-ftp less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064672" comment="php5-gd less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064673" comment="php5-gettext less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064674" comment="php5-gmp less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064675" comment="php5-hash less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064676" comment="php5-iconv less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064677" comment="php5-imap less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064678" comment="php5-intl less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064679" comment="php5-json less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064680" comment="php5-ldap less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064681" comment="php5-mbstring less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064682" comment="php5-mcrypt less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064683" comment="php5-mysql less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064684" comment="php5-odbc less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064685" comment="php5-openssl less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064686" comment="php5-pcntl less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064687" comment="php5-pdo less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064688" comment="php5-pear less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064689" comment="php5-pgsql less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064690" comment="php5-phar less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064691" comment="php5-posix less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064692" comment="php5-pspell less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064693" comment="php5-readline less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064694" comment="php5-shmop less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064695" comment="php5-snmp less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064696" comment="php5-soap less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064697" comment="php5-sockets less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064698" comment="php5-sqlite less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064699" comment="php5-suhosin less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064700" comment="php5-sysvmsg less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064701" comment="php5-sysvsem less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064702" comment="php5-sysvshm less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064703" comment="php5-tidy less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064704" comment="php5-tokenizer less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064705" comment="php5-wddx less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064706" comment="php5-xmlreader less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064707" comment="php5-xmlrpc less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064708" comment="php5-xmlwriter less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064709" comment="php5-xsl less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064710" comment="php5-zip less than 5.3.3-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064711" comment="php5-zlib less than 5.3.3-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3872</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3872" source="CVE"/>
	<description>
	The fcgid_header_bucket_read function in fcgid_bucket.c in the mod_fcgid module before 2.3.6 for the Apache HTTP Server does not use bytewise pointer arithmetic in certain circumstances, which has unspecified impact and attack vectors related to "untrusted FastCGI applications" and a "stack buffer overwrite."
	</description>
 </metadata>
<!-- 65e768c8ae81e31b003fae96752c7eb2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069759" comment="apache2-mod_fcgid less than 2.2-101.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3874</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3874" source="CVE"/>
	<description>
	Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3875</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875" source="CVE"/>
	<description>
	The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3876</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3876" source="CVE"/>
	<description>
	net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3877</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3877" source="CVE"/>
	<description>
	The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3879</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3879" source="CVE"/>
	<description>
	FUSE, possibly 2.8.5 and earlier, allows local users to create mtab entries with arbitrary pathnames, and consequently unmount any filesystem, via a symlink attack on the parent directory of the mountpoint of a FUSE filesystem, a different vulnerability than CVE-2010-0789.
	</description>
 </metadata>
<!-- 5d434b6485c2304298f396868f22e809 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066692" comment="fuse-devel-static less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066693" comment="fuse-devel less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066694" comment="fuse less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066695" comment="libblkid-devel-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066696" comment="libblkid-devel less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066697" comment="libblkid1-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066698" comment="libblkid1 less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066699" comment="libfuse2-32bit less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066700" comment="libfuse2 less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066701" comment="libuuid-devel-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066702" comment="libuuid-devel less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066703" comment="libuuid1-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066704" comment="libuuid1 less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066705" comment="util-linux-lang less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066706" comment="util-linux less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066707" comment="uuidd less than 2.17.2-6.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3880</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3880" source="CVE"/>
	<description>
	net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2bed7091aa699baa46f25b381a1bed8f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		</criteria>
	</criteria>
	<!-- f01566cf081c054148f1ca4c3bd88ebf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3881</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3881" source="CVE"/>
	<description>
	arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3900</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3900" source="CVE"/>
	<description>
	Midori before 0.2.5, when WebKitGTK+ before 1.1.14 or LibSoup before 2.29.91 is used, does not verify X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary https web sites via a crafted server certificate, a related issue to CVE-2010-3312.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3904</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3904" source="CVE"/>
	<description>
	The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
	</description>
 </metadata>
<!-- 0d27f71c8c526944c6fdd4e2a5422878 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063932" comment="kernel-debug-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063933" comment="kernel-debug-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063934" comment="kernel-debug less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063935" comment="kernel-default-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063936" comment="kernel-default-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063937" comment="kernel-default less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063938" comment="kernel-desktop-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063939" comment="kernel-desktop-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063940" comment="kernel-desktop less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063941" comment="kernel-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063942" comment="kernel-ec2-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063943" comment="kernel-ec2-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063944" comment="kernel-ec2-extra less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063945" comment="kernel-ec2 less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063946" comment="kernel-pae-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063947" comment="kernel-pae-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063948" comment="kernel-pae less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063949" comment="kernel-source-vanilla less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063950" comment="kernel-source less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063951" comment="kernel-syms less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063952" comment="kernel-trace-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063953" comment="kernel-trace-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063954" comment="kernel-trace less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063955" comment="kernel-vanilla-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063956" comment="kernel-vanilla-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063957" comment="kernel-vanilla less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063958" comment="kernel-vmi-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063959" comment="kernel-vmi-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063960" comment="kernel-vmi less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063961" comment="kernel-xen-base less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063962" comment="kernel-xen-devel less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063963" comment="kernel-xen less than 2.6.34.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063964" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.5-19.1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063965" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.5-19.1.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3906</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3906" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Gitweb 1.7.3.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) f and (2) fp parameters.
	</description>
 </metadata>
<!-- 1092eedde0f92f110cb3f946bae3efbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065797" comment="git-arch less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065798" comment="git-core less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065799" comment="git-cvs less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065800" comment="git-daemon less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065801" comment="git-email less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065802" comment="git-gui less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065803" comment="git-remote-helpers less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065804" comment="git-svn less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065805" comment="git-web less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065806" comment="git less than 1.7.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065807" comment="gitk less than 1.7.1-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3933</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3933" source="CVE"/>
	<description>
	Ruby on Rails 2.3.9 and 3.0.0 does not properly handle nested attributes, which allows remote attackers to modify arbitrary records by changing the names of parameters for form inputs.
	</description>
 </metadata>
<!-- e7571c569adf76cb0d4b776f86783aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072125" comment="rubygem-actionmailer-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072126" comment="rubygem-actionmailer less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072127" comment="rubygem-actionpack-2_3 less than 2.3.14-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072128" comment="rubygem-actionpack less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072129" comment="rubygem-activerecord-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072130" comment="rubygem-activerecord less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072131" comment="rubygem-activeresource-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072132" comment="rubygem-activeresource less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072133" comment="rubygem-activesupport-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072134" comment="rubygem-activesupport less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072135" comment="rubygem-rack less than 1.1.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072136" comment="rubygem-rails-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072137" comment="rubygem-rails less than 2.3.14-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3976</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3976" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a file that is processed by Flash Player.
	</description>
 </metadata>
<!-- 118393cb5d6c5eb8b87532b448eb409e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064232" comment="flash-player less than 10.1.102.64-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3996</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-3996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3996" source="CVE"/>
	<description>
	festival_server in Centre for Speech Technology Research (CSTR) Festival, probably 2.0.95-beta and earlier, places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
	</description>
 </metadata>
<!-- a66c9e550edb68911c494a2f01d0da5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063835" comment="festival-devel less than 1.96-126.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063836" comment="festival less than 1.96-126.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4005</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4005" source="CVE"/>
	<description>
	The (1) tomboy and (2) tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.  NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2.
	</description>
 </metadata>
<!-- d11e2264ff6e52cf21732059c7b17854 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064582" comment="tomboy-lang less than 1.2.1-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064583" comment="tomboy less than 1.2.1-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4008</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4008" source="CVE"/>
	<description>
	libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.
	</description>
 </metadata>
<!-- ac91028476d2b41921d628b3b81e5ec0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064584" comment="libxml2-32bit less than 2.7.7-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064585" comment="libxml2-devel-32bit less than 2.7.7-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064586" comment="libxml2-devel less than 2.7.7-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064587" comment="libxml2-doc less than 2.7.7-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064588" comment="libxml2 less than 2.7.7-4.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4014</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4014" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- a1e82bae773b3acde8a96d83d1c3f7af -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066606" comment="postgresql-contrib less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066607" comment="postgresql-devel less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066608" comment="postgresql-docs less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066609" comment="postgresql-libs-32bit less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066610" comment="postgresql-libs less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066611" comment="postgresql-plperl less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066612" comment="postgresql-plpython less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066613" comment="postgresql-pltcl less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066614" comment="postgresql-server less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066615" comment="postgresql less than 8.4.7-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4015</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4015" source="CVE"/>
	<description>
	Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions.
	</description>
 </metadata>
<!-- a1e82bae773b3acde8a96d83d1c3f7af -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066606" comment="postgresql-contrib less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066607" comment="postgresql-devel less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066608" comment="postgresql-docs less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066609" comment="postgresql-libs-32bit less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066610" comment="postgresql-libs less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066611" comment="postgresql-plperl less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066612" comment="postgresql-plpython less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066613" comment="postgresql-pltcl less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066614" comment="postgresql-server less than 8.4.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066615" comment="postgresql less than 8.4.7-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4020</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
	</description>
 </metadata>
<!-- c8c28ea32e843131e4622c708eb77d1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065105" comment="krb5-32bit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065106" comment="krb5-client less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065107" comment="krb5-devel-32bit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065108" comment="krb5-devel less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065109" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065110" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065111" comment="krb5-server less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065112" comment="krb5 less than 1.8.1-5.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4021</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021" source="CVE"/>
	<description>
	The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."
	</description>
 </metadata>
<!-- c8c28ea32e843131e4622c708eb77d1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065105" comment="krb5-32bit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065106" comment="krb5-client less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065107" comment="krb5-devel-32bit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065108" comment="krb5-devel less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065109" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065110" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065111" comment="krb5-server less than 1.8.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065112" comment="krb5 less than 1.8.1-5.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4022</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022" source="CVE"/>
	<description>
	The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.
	</description>
 </metadata>
<!-- 89ed397dfe1689f37817bd0e1028920f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065778" comment="krb5-32bit less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065779" comment="krb5-client less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065780" comment="krb5-devel-32bit less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065781" comment="krb5-devel less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065782" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065783" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065784" comment="krb5-server less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065785" comment="krb5 less than 1.8.1-5.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4040</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4040" source="CVE"/>
	<description>
	Google Chrome before 7.0.517.41 does not properly handle animated GIF images, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted image.
	</description>
 </metadata>
<!-- a287d13132a0586ee44740b31d8903f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065482" comment="libwebkit-1_0-2-32bit less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065483" comment="libwebkit-1_0-2 less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065484" comment="libwebkit-devel less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065485" comment="libwebkit-lang less than 1.2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065486" comment="webkit-jsc less than 1.2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4042</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4042" source="CVE"/>
	<description>
	Google Chrome before 7.0.517.41 does not properly handle element maps, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "stale elements."
	</description>
 </metadata>
<!-- 30b39a83dbb36ff2cc8542600c268763 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068428" comment="libwebkit-1_0-2-32bit less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068429" comment="libwebkit-1_0-2 less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068430" comment="libwebkit-devel less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068431" comment="libwebkit-lang less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068432" comment="webkit-jsc less than 1.2.7-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4071</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4071" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in AgentTicketZoom in OTRS 2.4.x before 2.4.9, when RichText is enabled, allows remote attackers to inject arbitrary web script or HTML via JavaScript in an HTML e-mail.
	</description>
 </metadata>
<!-- 6ae4525d37f89e114dc1e7a02ed8875f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065175" comment="otrs-doc less than 2.4.9-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065176" comment="otrs-itsm less than 2.1.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065177" comment="otrs less than 2.4.9-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4072</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072" source="CVE"/>
	<description>
	The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4073</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073" source="CVE"/>
	<description>
	The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4075</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4075" source="CVE"/>
	<description>
	The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4076</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4076" source="CVE"/>
	<description>
	The rs_ioctl function in drivers/char/amiserial.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4077</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4077" source="CVE"/>
	<description>
	The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4078</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4078" source="CVE"/>
	<description>
	The sisfb_ioctl function in drivers/video/sis/sis_main.c in the Linux kernel before 2.6.36-rc6 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4080</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4080" source="CVE"/>
	<description>
	The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4081</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4081" source="CVE"/>
	<description>
	The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4082</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4082" source="CVE"/>
	<description>
	The viafb_ioctl_get_viafb_info function in drivers/video/via/ioctl.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a VIAFB_GET_INFO ioctl call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4083</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4083" source="CVE"/>
	<description>
	The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4091</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091" source="CVE"/>
	<description>
	The EScript.api plugin in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.1, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document that triggers memory corruption, involving the printSeps function. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- 82eec958a08d3fc6d0b6d3f26f80f91b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064862" comment="acroread less than 9.4.1-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4098</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4098" source="CVE"/>
	<description>
	monotone before 0.48.1, when configured to allow remote commands, allows remote attackers to cause a denial of service (crash) via an empty argument to the mtn command.
	</description>
 </metadata>
<!-- f92d4341b743f5243b2ecad3cfc63d36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064320" comment="monotone less than 0.48.1-1.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4150</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4150" source="CVE"/>
	<description>
	Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4157</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4157" source="CVE"/>
	<description>
	Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4158</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158" source="CVE"/>
	<description>
	The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4162</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162" source="CVE"/>
	<description>
	Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4163</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4163" source="CVE"/>
	<description>
	The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.36.2 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		</criteria>
	</criteria>
	<!-- f01566cf081c054148f1ca4c3bd88ebf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4164</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164" source="CVE"/>
	<description>
	Multiple integer underflows in the x25_parse_facilities function in net/x25/x25_facilities.c in the Linux kernel before 2.6.36.2 allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data, a different vulnerability than CVE-2010-3873.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4165</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165" source="CVE"/>
	<description>
	The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4169</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4169" source="CVE"/>
	<description>
	Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4172</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4172" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the Manager application in Apache Tomcat 6.0.12 through 6.0.29 and 7.0.0 through 7.0.4 allow remote attackers to inject arbitrary web script or HTML via the (1) orderBy or (2) sort parameter to sessionsList.jsp, or unspecified input to (3) sessionDetail.jsp or (4) java/org/apache/catalina/manager/JspHelper.java, related to use of untrusted web applications.
	</description>
 </metadata>
<!-- 2152d89e75df9a00581d836cf42d421a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065667" comment="tomcat6-admin-webapps less than 6.0.24-5.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065668" comment="tomcat6-docs-webapp less than 6.0.24-5.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065669" comment="tomcat6-el-1_0-api less than 6.0.24-5.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065670" comment="tomcat6-javadoc less than 6.0.24-5.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065671" comment="tomcat6-jsp-2_1-api less than 6.0.24-5.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065672" comment="tomcat6-lib less than 6.0.24-5.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065673" comment="tomcat6-servlet-2_5-api less than 6.0.24-5.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065674" comment="tomcat6-webapps less than 6.0.24-5.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065675" comment="tomcat6 less than 6.0.24-5.8.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4175</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4175" source="CVE"/>
	<description>
	Integer overflow in the rds_cmsg_rdma_args function (net/rds/rdma.c) in Linux kernel 2.6.35 allows local users to cause a denial of service (crash) and possibly trigger memory corruption via a crafted Reliable Datagram Sockets (RDS) request, a different vulnerability than CVE-2010-3865.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4180</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4180" source="CVE"/>
	<description>
	OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3878cb127b380ae388db535838afb9e6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069568" comment="compat-openssl097g-32bit less than 0.9.7g-155.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069569" comment="compat-openssl097g less than 0.9.7g-155.3.1"/>
		</criteria>
	</criteria>
	<!-- d5b31ed982ed1f2e0bb8cb00579ee6aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065435" comment="libopenssl-devel less than 1.0.0-6.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065436" comment="libopenssl0_9_8-32bit less than 0.9.8m-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065437" comment="libopenssl0_9_8 less than 0.9.8m-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065438" comment="libopenssl1_0_0-32bit less than 1.0.0-6.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065439" comment="libopenssl1_0_0 less than 1.0.0-6.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065440" comment="openssl-doc less than 1.0.0-6.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065441" comment="openssl less than 1.0.0-6.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4226</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4226" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- dd8c2662c660015cac9fcdec1cd1bd64 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066154" comment="build-mkbaselibs less than 2010.07.28-1.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066153" comment="build less than 2010.07.28-1.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4237</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4237" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- d3bce0a98c85046d106af2afefef4f4d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064845" comment="mercurial less than 1.5-4.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4243</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4243" source="CVE"/>
	<description>
	fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an "OOM dodging issue," a related issue to CVE-2010-3858.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4248</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4248" source="CVE"/>
	<description>
	Race condition in the __exit_signal function in kernel/exit.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors related to multithreaded exec, the use of a thread group leader in kernel/posix-cpu-timers.c, and the selection of a new thread group leader in the de_thread function in fs/exec.c.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4250</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4250" source="CVE"/>
	<description>
	Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4251</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4251" source="CVE"/>
	<description>
	The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4253</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4253" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4253" source="CVE"/>
	<description>
	Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file in an ODF or Microsoft Office document, as demonstrated by a PowerPoint (aka PPT) document.
	</description>
 </metadata>
<!-- 738b6be686cb4004906408a9188c527a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4254</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4254" source="CVE"/>
	<description>
	Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call.
	</description>
 </metadata>
<!-- f0aaf07b8c8bd62c377f82f3cf8d086b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065178" comment="libmoon-devel less than 2.2-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065179" comment="libmoon0 less than 2.2-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065180" comment="moonlight-desktop-devel less than 2.2-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065181" comment="moonlight-desktop less than 2.2-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065182" comment="moonlight-plugin less than 2.2-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065183" comment="moonlight-tools less than 2.2-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065184" comment="moonlight-web-devel less than 2.2-4.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4255</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4255" source="CVE"/>
	<description>
	The fixup_page_fault function in arch/x86/traps.c in Xen 4.0.1 and earlier on 64-bit platforms, when paravirtualization is enabled, does not verify that kernel mode is used to call the handle_gdt_ldt_mapping_fault function, which allows guest OS users to cause a denial of service (host OS BUG_ON) via a crafted memory access.
	</description>
 </metadata>
<!-- 95dd4d43bf606b24e65a58a7c22e5727 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069146" comment="vm-install less than 0.4.27-2.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069147" comment="xen-devel less than 4.0.1_21326_02-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069148" comment="xen-doc-html less than 4.0.1_21326_02-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069149" comment="xen-doc-pdf less than 4.0.1_21326_02-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069150" comment="xen-kmp-default less than 4.0.1_21326_02_k2.6.34.7_0.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069151" comment="xen-kmp-desktop less than 4.0.1_21326_02_k2.6.34.7_0.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069152" comment="xen-kmp-pae less than 4.0.1_21326_02_k2.6.34.7_0.7-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069153" comment="xen-libs less than 4.0.1_21326_02-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069154" comment="xen-tools-domU less than 4.0.1_21326_02-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069155" comment="xen-tools less than 4.0.1_21326_02-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069156" comment="xen less than 4.0.1_21326_02-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4258</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258" source="CVE"/>
	<description>
	The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4260</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4260" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV before 0.96.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document, aka (1) "bb #2358" and (2) "bb #2396."
	</description>
 </metadata>
<!-- 94c4a8f903f769dd6dba17f4714711ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064961" comment="clamav-db less than 0.96.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064962" comment="clamav less than 0.96.5-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4261</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4261" source="CVE"/>
	<description>
	Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 94c4a8f903f769dd6dba17f4714711ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064961" comment="clamav-db less than 0.96.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064962" comment="clamav less than 0.96.5-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4267</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267" source="CVE"/>
	<description>
	Stack-based buffer overflow in the hpmud_get_pml function in io/hpmud/pml.c in Hewlett-Packard Linux Imaging and Printing (HPLIP) 1.6.7, 3.9.8, 3.10.9, and probably other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SNMP response with a large length value.
	</description>
 </metadata>
<!-- ec5fdd1017f5cb38e3fe2c7e7e66d273 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065620" comment="hplip-hpijs less than 3.10.2-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065621" comment="hplip less than 3.10.2-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4300</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300" source="CVE"/>
	<description>
	Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4301</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4301" source="CVE"/>
	<description>
	epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.
	</description>
 </metadata>
<!-- 3a1582db9f0701654a550e151c7852f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065487" comment="wireshark-devel less than 1.4.2-1.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065488" comment="wireshark less than 1.4.2-1.1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4341</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4341" source="CVE"/>
	<description>
	The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
	</description>
 </metadata>
<!-- ba141df885f3aefe25c8b888b999fc26 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065564" comment="libcollection-devel less than 0.4.0-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065565" comment="libcollection1 less than 0.4.0-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065566" comment="libdhash-devel less than 0.4.0-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065567" comment="libdhash1 less than 0.4.0-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065568" comment="libini_config-devel less than 0.4.0-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065569" comment="libini_config1 less than 0.4.0-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065570" comment="python-sssd-config less than 1.1.0-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065571" comment="sssd-32bit less than 1.1.0-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065572" comment="sssd-ipa-provider less than 1.1.0-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065573" comment="sssd-tools less than 1.1.0-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065574" comment="sssd less than 1.1.0-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4342</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342" source="CVE"/>
	<description>
	The aun_incoming function in net/econet/af_econet.c in the Linux kernel before 2.6.37-rc6, when Econet is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending an Acorn Universal Networking (AUN) packet over UDP.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4343</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4343" source="CVE"/>
	<description>
	drivers/scsi/bfa/bfa_core.c in the Linux kernel before 2.6.35 does not initialize a certain port data structure, which allows local users to cause a denial of service (system crash) via read operations on an fc_host statistics file.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4344</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4344" source="CVE"/>
	<description>
	Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
	</description>
 </metadata>
<!-- 8c1215bc2f7e5cfe622c100c40347cc2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065113" comment="exim less than 4.71-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065114" comment="eximon less than 4.71-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065115" comment="eximstats-html less than 4.71-4.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4345</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4345" source="CVE"/>
	<description>
	Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
	</description>
 </metadata>
<!-- 8c1215bc2f7e5cfe622c100c40347cc2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065113" comment="exim less than 4.71-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065114" comment="eximon less than 4.71-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065115" comment="eximstats-html less than 4.71-4.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4346</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4346" source="CVE"/>
	<description>
	The install_special_mapping function in mm/mmap.c in the Linux kernel before 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4347</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4347" source="CVE"/>
	<description>
	The ACPI subsystem in the Linux kernel before 2.6.36.2 uses 0222 permissions for the debugfs custom_method file, which allows local users to gain privileges by placing a custom ACPI method in the ACPI interpreter tables, related to the acpi_debugfs_init function in drivers/acpi/debugfs.c.
	</description>
 </metadata>
<!-- 7d56748020c6dcf27ceb9fd89fc28b3c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065366" comment="kernel-debug-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065367" comment="kernel-debug-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065368" comment="kernel-debug less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065369" comment="kernel-default-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065370" comment="kernel-default-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065371" comment="kernel-default less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065372" comment="kernel-desktop-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065373" comment="kernel-desktop-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065374" comment="kernel-desktop less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065375" comment="kernel-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065376" comment="kernel-ec2-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065377" comment="kernel-ec2-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065378" comment="kernel-ec2-extra less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065379" comment="kernel-ec2 less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065380" comment="kernel-pae-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065381" comment="kernel-pae-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065382" comment="kernel-pae less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065383" comment="kernel-source-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065384" comment="kernel-source less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065385" comment="kernel-syms less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065386" comment="kernel-trace-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065387" comment="kernel-trace-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065388" comment="kernel-trace less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065389" comment="kernel-vanilla-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065390" comment="kernel-vanilla-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065391" comment="kernel-vanilla less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065392" comment="kernel-vmi-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065393" comment="kernel-vmi-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065394" comment="kernel-vmi less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065395" comment="kernel-xen-base less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065396" comment="kernel-xen-devel less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065397" comment="kernel-xen less than 2.6.34.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065398" comment="preload-kmp-default less than 1.1_k2.6.34.7_0.7-19.1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065399" comment="preload-kmp-desktop less than 1.1_k2.6.34.7_0.7-19.1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4351</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4351" source="CVE"/>
	<description>
	The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader.
	</description>
 </metadata>
<!-- 5201379a7c3f327366f27f0de332aad0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065558" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065559" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065560" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065561" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065562" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065563" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.4-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4352</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352" source="CVE"/>
	<description>
	Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.
	</description>
 </metadata>
<!-- 0c7983b4e3b5303a5d0b54a8caa941b7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068004" comment="dbus-1-32bit less than 1.2.24-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068005" comment="dbus-1-devel-32bit less than 1.2.24-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068006" comment="dbus-1-devel-doc less than 1.2.24-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068007" comment="dbus-1-devel less than 1.2.24-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068008" comment="dbus-1 less than 1.2.24-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4409</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4409" source="CVE"/>
	<description>
	Integer overflow in the NumberFormatter::getSymbol (aka numfmt_get_symbol) function in PHP 5.3.3 and earlier allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument.
	</description>
 </metadata>
<!-- fe258b2539e751fdfaa114332260b7f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072650" comment="icu-data less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072651" comment="icu less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072652" comment="libicu-32bit less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072653" comment="libicu-devel-32bit less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072654" comment="libicu-devel less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072655" comment="libicu-doc less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072656" comment="libicu less than 4.2-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4410</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4410" source="CVE"/>
	<description>
	CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 79b2991fe1ea88aeb8b543d450fe3d3b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065666" comment="perl-CGI-Simple less than 1.113-0.3.1"/>
	</criteria>
	<!-- b2e32dc284341acc0d3756068c0ef366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065599" comment="perl-32bit less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065600" comment="perl-base-32bit less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065601" comment="perl-base less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065602" comment="perl-doc less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065603" comment="perl less than 5.12.1-2.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4411</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4411" source="CVE"/>
	<description>
	Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 79b2991fe1ea88aeb8b543d450fe3d3b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065666" comment="perl-CGI-Simple less than 1.113-0.3.1"/>
	</criteria>
	<!-- b2e32dc284341acc0d3756068c0ef366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065599" comment="perl-32bit less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065600" comment="perl-base-32bit less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065601" comment="perl-base less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065602" comment="perl-doc less than 5.12.1-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065603" comment="perl less than 5.12.1-2.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4422</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4422" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4447</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4447" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4448</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4448" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Networking.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue involves "DNS cache poisoning by untrusted applets."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4cae64c147405ced352b3a74c41b1c19 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065972" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065973" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065974" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065975" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065976" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065977" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		</criteria>
	</criteria>
	<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4450</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4450" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Solaris and Linux; 5.0 Update 27 and earlier for Solaris and Linux; and 1.4.2_29 and earlier for Solaris and Linux allows local standalone applications to affect confidentiality, integrity, and availability via unknown vectors related to Launcher.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is an untrusted search path vulnerability involving an empty LD_LIBRARY_PATH environment variable.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4cae64c147405ced352b3a74c41b1c19 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065972" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065973" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065974" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065975" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065976" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065977" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		</criteria>
	</criteria>
	<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4451</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4451" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Windows, when using Java Update, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4452</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4452" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4454</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4454" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4462</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4462" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4463</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4463" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 21 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4465</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4465" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or "clipboard access in Applets."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4cae64c147405ced352b3a74c41b1c19 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065972" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065973" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065974" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065975" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065976" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065977" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		</criteria>
	</criteria>
	<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4466</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4466" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Windows, Solaris, and, Linux; 5.0 Update 27 and earlier for Windows; and 1.4.2_29 and earlier for Windows allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4467</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4467" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 10 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4468</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4468" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to JDBC.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4469</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4469" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is heap corruption related to the Verifier and "backward jsrs."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4cae64c147405ced352b3a74c41b1c19 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065972" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065973" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065974" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065975" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065976" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065977" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		</criteria>
	</criteria>
	<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4470</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4470" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23, and, and earlier allows remote attackers to affect availability via unknown vectors related to JAXP and unspecified APIs.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is related to "Features set on SchemaFactory not inherited by Validator."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4cae64c147405ced352b3a74c41b1c19 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065972" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065973" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065974" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065975" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065976" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065977" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		</criteria>
	</criteria>
	<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4471</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4471" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to 2D.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is related to the exposure of system properties via vectors related to Font.createFont and exception text.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4cae64c147405ced352b3a74c41b1c19 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065972" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065973" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065974" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065975" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065976" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065977" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		</criteria>
	</criteria>
	<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4472</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4472" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote attackers to affect availability, related to XML Digital Signature and unspecified APIs.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue involves the replacement of the "XML DSig Transform or C14N algorithm implementations."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4cae64c147405ced352b3a74c41b1c19 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065972" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065973" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065974" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065975" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065976" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.7-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065977" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		</criteria>
	</criteria>
	<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4473</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4473" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4474</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4474" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java DB component in Oracle Java SE and Java for Business 6 Update 23, and, and earlier allows local users to affect confidentiality via unknown vectors related to Security, a similar vulnerability to CVE-2009-4269.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4475</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4475" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4476</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476" source="CVE"/>
	<description>
	The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
	</description>
 </metadata>
<!-- dfa947ed26289f5461eec3fea1eeb3f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065833" comment="java-1_6_0-sun-alsa less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065835" comment="java-1_6_0-sun-devel less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065836" comment="java-1_6_0-sun-jdbc less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065837" comment="java-1_6_0-sun-plugin less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065838" comment="java-1_6_0-sun-src less than 1.6.0.u24-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065839" comment="java-1_6_0-sun less than 1.6.0.u24-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4492</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4492" source="CVE"/>
	<description>
	Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving SVG animations.
	</description>
 </metadata>
<!-- 30b39a83dbb36ff2cc8542600c268763 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068428" comment="libwebkit-1_0-2-32bit less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068429" comment="libwebkit-1_0-2 less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068430" comment="libwebkit-devel less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068431" comment="libwebkit-lang less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068432" comment="webkit-jsc less than 1.2.7-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4493</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4493" source="CVE"/>
	<description>
	Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service via vectors related to the handling of mouse dragging events.
	</description>
 </metadata>
<!-- 30b39a83dbb36ff2cc8542600c268763 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068428" comment="libwebkit-1_0-2-32bit less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068429" comment="libwebkit-1_0-2 less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068430" comment="libwebkit-devel less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068431" comment="libwebkit-lang less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068432" comment="webkit-jsc less than 1.2.7-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4494</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4494" source="CVE"/>
	<description>
	Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
	</description>
 </metadata>
<!-- adb565d77b411d0dfcb59e652ffb2251 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066622" comment="libxml2-32bit less than 2.7.7-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066623" comment="libxml2-devel-32bit less than 2.7.7-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066624" comment="libxml2-devel less than 2.7.7-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066625" comment="libxml2-doc less than 2.7.7-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066626" comment="libxml2 less than 2.7.7-4.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4508</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4508" source="CVE"/>
	<description>
	The WebSockets implementation in Mozilla Firefox 4 through 4.0 Beta 7 does not properly perform proxy upgrade negotiation, which has unspecified impact and remote attack vectors, related to an "inherent problem" with the WebSocket specification.
	</description>
 </metadata>
<!-- 768d80bbfed27d231ec910720bbb5412 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065321" comment="opera-gtk less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065322" comment="opera-kde4 less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065323" comment="opera less than 11.00-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4523</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4523" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13 and earlier allow physically proximate attackers to execute arbitrary code via a long serial-number field on a smart card, related to (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c.
	</description>
 </metadata>
<!-- 312bb87a60393e57ffea137c0115ade6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065494" comment="libopensc2-32bit less than 0.11.13-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065495" comment="libopensc2 less than 0.11.13-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065496" comment="opensc-32bit less than 0.11.13-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065497" comment="opensc-devel less than 0.11.13-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065498" comment="opensc less than 0.11.13-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4525</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4525" source="CVE"/>
	<description>
	Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events-&gt;interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4527</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527" source="CVE"/>
	<description>
	The load_mixer_volumes function in sound/oss/soundcard.c in the OSS sound subsystem in the Linux kernel before 2.6.37 incorrectly expects that a certain name field ends with a '\0' character, which allows local users to conduct buffer overflow attacks and gain privileges, or possibly obtain sensitive information from kernel memory, via a SOUND_MIXER_SETLEVELS ioctl call.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4528</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4528" source="CVE"/>
	<description>
	directconn.c in the MSN protocol plugin in libpurple 2.7.6 through 2.7.8 in Pidgin before 2.7.9 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a short p2pv2 packet in a DirectConnect (aka direct connection) session.
	</description>
 </metadata>
<!-- 60bd4512c3c438131b339677534a0d92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065467" comment="finch-devel less than 2.7.9-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065468" comment="finch less than 2.7.9-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065469" comment="libpurple-devel less than 2.7.9-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065470" comment="libpurple-lang less than 2.7.9-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065471" comment="libpurple-meanwhile less than 2.7.9-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065472" comment="libpurple-mono less than 2.7.9-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065473" comment="libpurple-tcl less than 2.7.9-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065474" comment="libpurple less than 2.7.9-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065475" comment="pidgin-devel less than 2.7.9-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065476" comment="pidgin-otr less than 3.2.0-146.1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065477" comment="pidgin less than 2.7.9-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4529</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4529" source="CVE"/>
	<description>
	Integer underflow in the irda_getsockopt function in net/irda/af_irda.c in the Linux kernel before 2.6.37 on platforms other than x86 allows local users to obtain potentially sensitive information from kernel heap memory via an IRLMP_ENUMDEVICES getsockopt call.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4530</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4530" source="CVE"/>
	<description>
	Signedness error in ccid_serial.c in libccid in the USB Chip/Smart Card Interface Devices (CCID) driver, as used in pcscd in PCSC-Lite 1.5.3 and possibly other products, allows physically proximate attackers to execute arbitrary code via a smart card with a crafted serial number that causes a negative value to be used in a memcpy operation, which triggers a buffer overflow.  NOTE: some sources refer to this issue as an integer overflow.
	</description>
 </metadata>
<!-- ff7eee298364416e6718096565b357b2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065693" comment="libpcsclite1-32bit less than 1.5.5-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065694" comment="libpcsclite1 less than 1.5.5-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065695" comment="pcsc-ccid less than 1.3.11-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065696" comment="pcsc-lite-devel less than 1.5.5-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065697" comment="pcsc-lite less than 1.5.5-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4531</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4531" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value.
	</description>
 </metadata>
<!-- ff7eee298364416e6718096565b357b2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065693" comment="libpcsclite1-32bit less than 1.5.5-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065694" comment="libpcsclite1 less than 1.5.5-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065695" comment="pcsc-ccid less than 1.3.11-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065696" comment="pcsc-lite-devel less than 1.5.5-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065697" comment="pcsc-lite less than 1.5.5-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4539</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4539" source="CVE"/>
	<description>
	The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
	</description>
 </metadata>
<!-- 0ac79a390b8c314a5c62e76f50c46d2b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065872" comment="libsvn_auth_gnome_keyring-1-0 less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065873" comment="libsvn_auth_kwallet-1-0 less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065874" comment="subversion-devel less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065875" comment="subversion-perl less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065876" comment="subversion-python less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065877" comment="subversion-ruby less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065878" comment="subversion-server less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065879" comment="subversion-tools less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065880" comment="subversion less than 1.6.9-4.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4540</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4540" source="CVE"/>
	<description>
	Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS &gt; LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- f05cfefef1b777104ad340e4e4847c8a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066030" comment="gimp-branding-upstream less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066031" comment="gimp-devel less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066032" comment="gimp-help-browser less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066033" comment="gimp-lang less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066034" comment="gimp-module-hal less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066035" comment="gimp-plugins-python less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066036" comment="gimp less than 2.6.8-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4541</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4541" source="CVE"/>
	<description>
	Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.
	</description>
 </metadata>
<!-- f05cfefef1b777104ad340e4e4847c8a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066030" comment="gimp-branding-upstream less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066031" comment="gimp-devel less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066032" comment="gimp-help-browser less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066033" comment="gimp-lang less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066034" comment="gimp-module-hal less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066035" comment="gimp-plugins-python less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066036" comment="gimp less than 2.6.8-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4542</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4542" source="CVE"/>
	<description>
	Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- f05cfefef1b777104ad340e4e4847c8a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066030" comment="gimp-branding-upstream less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066031" comment="gimp-devel less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066032" comment="gimp-help-browser less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066033" comment="gimp-lang less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066034" comment="gimp-module-hal less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066035" comment="gimp-plugins-python less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066036" comment="gimp less than 2.6.8-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4543</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4543" source="CVE"/>
	<description>
	Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- f05cfefef1b777104ad340e4e4847c8a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066030" comment="gimp-branding-upstream less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066031" comment="gimp-devel less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066032" comment="gimp-help-browser less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066033" comment="gimp-lang less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066034" comment="gimp-module-hal less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066035" comment="gimp-plugins-python less than 2.6.8-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066036" comment="gimp less than 2.6.8-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4578</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4578" source="CVE"/>
	<description>
	Google Chrome before 8.0.552.224 and Chrome OS before 8.0.552.343 do not properly perform cursor handling, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale pointers."
	</description>
 </metadata>
<!-- 30b39a83dbb36ff2cc8542600c268763 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068428" comment="libwebkit-1_0-2-32bit less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068429" comment="libwebkit-1_0-2 less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068430" comment="libwebkit-devel less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068431" comment="libwebkit-lang less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068432" comment="webkit-jsc less than 1.2.7-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4579</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4579" source="CVE"/>
	<description>
	Opera before 11.00 does not properly constrain dialogs to appear on top of rendered documents, which makes it easier for remote attackers to trick users into interacting with a crafted web site that spoofs the (1) security information dialog or (2) download dialog.
	</description>
 </metadata>
<!-- 768d80bbfed27d231ec910720bbb5412 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065321" comment="opera-gtk less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065322" comment="opera-kde4 less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065323" comment="opera less than 11.00-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4580</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4580" source="CVE"/>
	<description>
	Opera before 11.00 does not clear WAP WML form fields after manual navigation to a new web site, which allows remote attackers to obtain sensitive information via an input field that has the same name as an input field on a previously visited web site.
	</description>
 </metadata>
<!-- 768d80bbfed27d231ec910720bbb5412 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065321" comment="opera-gtk less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065322" comment="opera-kde4 less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065323" comment="opera less than 11.00-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4581</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4581" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.00 has unknown impact and attack vectors, related to "a high severity issue."
	</description>
 </metadata>
<!-- 768d80bbfed27d231ec910720bbb5412 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065321" comment="opera-gtk less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065322" comment="opera-kde4 less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065323" comment="opera less than 11.00-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4582</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4582" source="CVE"/>
	<description>
	Opera before 11.00 does not properly handle security policies during updates to extensions, which might allow remote attackers to bypass intended access restrictions via unspecified vectors.
	</description>
 </metadata>
<!-- 768d80bbfed27d231ec910720bbb5412 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065321" comment="opera-gtk less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065322" comment="opera-kde4 less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065323" comment="opera less than 11.00-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4583</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4583" source="CVE"/>
	<description>
	Opera before 11.00, when Opera Turbo is enabled, does not display a page's security indication, which makes it easier for remote attackers to spoof trusted content via a crafted web site.
	</description>
 </metadata>
<!-- 768d80bbfed27d231ec910720bbb5412 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065321" comment="opera-gtk less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065322" comment="opera-kde4 less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065323" comment="opera less than 11.00-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4584</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4584" source="CVE"/>
	<description>
	Opera before 11.00, when Opera Turbo is used, does not properly present information about problematic X.509 certificates on https web sites, which might make it easier for remote attackers to spoof trusted content via a crafted web site.
	</description>
 </metadata>
<!-- 768d80bbfed27d231ec910720bbb5412 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065321" comment="opera-gtk less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065322" comment="opera-kde4 less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065323" comment="opera less than 11.00-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4585</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4585" source="CVE"/>
	<description>
	Unspecified vulnerability in the auto-update functionality in Opera before 11.00 allows remote attackers to cause a denial of service (application crash) by triggering an Opera Unite update.
	</description>
 </metadata>
<!-- 768d80bbfed27d231ec910720bbb5412 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065321" comment="opera-gtk less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065322" comment="opera-kde4 less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065323" comment="opera less than 11.00-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4586</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4586" source="CVE"/>
	<description>
	The default configuration of Opera before 11.00 enables WebSockets functionality, which has unspecified impact and remote attack vectors, possibly a related issue to CVE-2010-4508.
	</description>
 </metadata>
<!-- 768d80bbfed27d231ec910720bbb5412 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065321" comment="opera-gtk less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065322" comment="opera-kde4 less than 11.00-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065323" comment="opera less than 11.00-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4643</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4643" source="CVE"/>
	<description>
	Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file in an ODF or Microsoft Office document.
	</description>
 </metadata>
<!-- 738b6be686cb4004906408a9188c527a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067303" comment="OpenOffice_org less than 3.3.1.2.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067605" comment="aspell-de less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067606" comment="igerman98-doc less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067607" comment="ispell-naustrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067608" comment="ispell-ngerman less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067609" comment="ispell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067304" comment="libreoffice-artwork-devel less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067305" comment="libreoffice-base-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067306" comment="libreoffice-base-drivers-mysql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067307" comment="libreoffice-base-drivers-postgresql less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067308" comment="libreoffice-base-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067309" comment="libreoffice-base-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067310" comment="libreoffice-base less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067311" comment="libreoffice-bootstrap less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067312" comment="libreoffice-branding-openSUSE less than 3.3.1-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067313" comment="libreoffice-branding-upstream less than 3.3.1.2-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067314" comment="libreoffice-calc-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067315" comment="libreoffice-calc-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067316" comment="libreoffice-calc-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067317" comment="libreoffice-calc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067318" comment="libreoffice-components-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067319" comment="libreoffice-components-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067320" comment="libreoffice-components less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067321" comment="libreoffice-converter less than 3.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067322" comment="libreoffice-draw-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067323" comment="libreoffice-draw less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067324" comment="libreoffice-filters-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067325" comment="libreoffice-filters-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067326" comment="libreoffice-filters-optional less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067327" comment="libreoffice-filters less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067328" comment="libreoffice-gnome less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067329" comment="libreoffice-help-ar less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067330" comment="libreoffice-help-cs less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067331" comment="libreoffice-help-da less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067332" comment="libreoffice-help-de less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067333" comment="libreoffice-help-en-GB less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067334" comment="libreoffice-help-en-US-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067335" comment="libreoffice-help-en-US less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067336" comment="libreoffice-help-en-ZA less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067337" comment="libreoffice-help-es less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067338" comment="libreoffice-help-et less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067339" comment="libreoffice-help-fr less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067340" comment="libreoffice-help-gl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067341" comment="libreoffice-help-gu-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067342" comment="libreoffice-help-hi-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067343" comment="libreoffice-help-hu less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067344" comment="libreoffice-help-it less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067345" comment="libreoffice-help-ja less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067346" comment="libreoffice-help-km less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067347" comment="libreoffice-help-ko less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067348" comment="libreoffice-help-nl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067349" comment="libreoffice-help-pa-IN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067350" comment="libreoffice-help-pl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067351" comment="libreoffice-help-pt-BR less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067352" comment="libreoffice-help-pt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067353" comment="libreoffice-help-ru less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067354" comment="libreoffice-help-sl less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067355" comment="libreoffice-help-sv less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067356" comment="libreoffice-help-zh-CN less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067357" comment="libreoffice-help-zh-TW less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067358" comment="libreoffice-hyphen less than 20110203.1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067610" comment="libreoffice-icon-theme-crystal less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067611" comment="libreoffice-icon-theme-galaxy less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067612" comment="libreoffice-icon-theme-hicontrast less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067613" comment="libreoffice-icon-theme-oxygen less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067614" comment="libreoffice-icon-theme-tango less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067364" comment="libreoffice-icon-themes-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067365" comment="libreoffice-impress-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067366" comment="libreoffice-impress-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067367" comment="libreoffice-impress-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067368" comment="libreoffice-impress less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067369" comment="libreoffice-kde4 less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067370" comment="libreoffice-kde less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067371" comment="libreoffice-l10n-af less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067372" comment="libreoffice-l10n-ar less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067373" comment="libreoffice-l10n-be-BY less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067374" comment="libreoffice-l10n-bg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067375" comment="libreoffice-l10n-br less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067376" comment="libreoffice-l10n-ca less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067377" comment="libreoffice-l10n-cs less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067378" comment="libreoffice-l10n-cy less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067379" comment="libreoffice-l10n-da less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067380" comment="libreoffice-l10n-de less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067381" comment="libreoffice-l10n-el less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067382" comment="libreoffice-l10n-en-GB less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067383" comment="libreoffice-l10n-en-ZA less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067384" comment="libreoffice-l10n-es less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067385" comment="libreoffice-l10n-et less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067386" comment="libreoffice-l10n-extras-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067387" comment="libreoffice-l10n-extras-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067388" comment="libreoffice-l10n-extras less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067389" comment="libreoffice-l10n-fi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067390" comment="libreoffice-l10n-fr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067391" comment="libreoffice-l10n-ga less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067392" comment="libreoffice-l10n-gl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067393" comment="libreoffice-l10n-gu-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067394" comment="libreoffice-l10n-he less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067395" comment="libreoffice-l10n-hi-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067396" comment="libreoffice-l10n-hr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067397" comment="libreoffice-l10n-hu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067398" comment="libreoffice-l10n-it less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067399" comment="libreoffice-l10n-ja less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067400" comment="libreoffice-l10n-ka less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067401" comment="libreoffice-l10n-km less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067402" comment="libreoffice-l10n-ko less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067403" comment="libreoffice-l10n-lt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067404" comment="libreoffice-l10n-mk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067405" comment="libreoffice-l10n-nb less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067406" comment="libreoffice-l10n-nl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067407" comment="libreoffice-l10n-nn less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067408" comment="libreoffice-l10n-nr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067409" comment="libreoffice-l10n-pa-IN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067410" comment="libreoffice-l10n-pl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067411" comment="libreoffice-l10n-prebuilt less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067412" comment="libreoffice-l10n-pt-BR less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067413" comment="libreoffice-l10n-pt less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067414" comment="libreoffice-l10n-ru less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067415" comment="libreoffice-l10n-rw less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067416" comment="libreoffice-l10n-sh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067417" comment="libreoffice-l10n-sk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067418" comment="libreoffice-l10n-sl less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067419" comment="libreoffice-l10n-sr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067420" comment="libreoffice-l10n-ss less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067421" comment="libreoffice-l10n-st less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067422" comment="libreoffice-l10n-sv less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067423" comment="libreoffice-l10n-tg less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067424" comment="libreoffice-l10n-th less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067425" comment="libreoffice-l10n-tr less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067426" comment="libreoffice-l10n-ts less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067427" comment="libreoffice-l10n-uk less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067428" comment="libreoffice-l10n-ve less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067429" comment="libreoffice-l10n-vi less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067430" comment="libreoffice-l10n-xh less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067431" comment="libreoffice-l10n-zh-CN less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067432" comment="libreoffice-l10n-zh-TW less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067433" comment="libreoffice-l10n-zu less than 3.3.1.2-2.2.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067434" comment="libreoffice-languagetool-ca less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067435" comment="libreoffice-languagetool-de less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067436" comment="libreoffice-languagetool-en less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067437" comment="libreoffice-languagetool-es less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067438" comment="libreoffice-languagetool-fr less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067439" comment="libreoffice-languagetool-gl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067440" comment="libreoffice-languagetool-it less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067441" comment="libreoffice-languagetool-nl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067442" comment="libreoffice-languagetool-pl less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067443" comment="libreoffice-languagetool-ro less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067444" comment="libreoffice-languagetool-ru less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067445" comment="libreoffice-languagetool-sk less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067446" comment="libreoffice-languagetool-sv less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067447" comment="libreoffice-languagetool less than 1.2-7.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067448" comment="libreoffice-libs-core-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067449" comment="libreoffice-libs-core-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067450" comment="libreoffice-libs-core less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067451" comment="libreoffice-libs-extern-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067452" comment="libreoffice-libs-extern-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067453" comment="libreoffice-libs-extern less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067454" comment="libreoffice-libs-gui-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067455" comment="libreoffice-libs-gui-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067456" comment="libreoffice-libs-gui less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067457" comment="libreoffice-mailmerge less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067458" comment="libreoffice-math less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067459" comment="libreoffice-mono less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067460" comment="libreoffice-officebean less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067461" comment="libreoffice-openclipart less than 3.3-1.12.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067462" comment="libreoffice-pyuno less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067463" comment="libreoffice-templates-de less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067464" comment="libreoffice-templates-en less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066310" comment="libreoffice-templates-labels-a4 less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066311" comment="libreoffice-templates-labels-letter less than 1.0.1-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067465" comment="libreoffice-templates-presentation-layouts less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067466" comment="libreoffice-templates-ru less than 3.3-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067467" comment="libreoffice-testing less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067468" comment="libreoffice-testtool less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067469" comment="libreoffice-thesaurus-bg less than 20071210.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067470" comment="libreoffice-thesaurus-ca less than 1.5.0.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067471" comment="libreoffice-thesaurus-cs less than 20070913.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067472" comment="libreoffice-thesaurus-da less than 20100126.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067473" comment="libreoffice-thesaurus-de-AT less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067474" comment="libreoffice-thesaurus-de-CH less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067475" comment="libreoffice-thesaurus-de less than 20100307.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067476" comment="libreoffice-thesaurus-el less than 20061203.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067477" comment="libreoffice-thesaurus-en-AU less than 20081215.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067478" comment="libreoffice-thesaurus-en-GB less than 20051128.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067479" comment="libreoffice-thesaurus-en-US less than 20060111.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067480" comment="libreoffice-thesaurus-es-AR less than 0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067481" comment="libreoffice-thesaurus-es-VE less than 1.0.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067482" comment="libreoffice-thesaurus-es less than 20050720.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067483" comment="libreoffice-thesaurus-fr less than 20100125.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067484" comment="libreoffice-thesaurus-ga less than 20071002.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067485" comment="libreoffice-thesaurus-hu less than 20080319.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067486" comment="libreoffice-thesaurus-it less than 20081129.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067487" comment="libreoffice-thesaurus-nb less than 20080310.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067488" comment="libreoffice-thesaurus-ne less than 1.1.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067489" comment="libreoffice-thesaurus-pl less than 20081206.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067490" comment="libreoffice-thesaurus-pt less than 20091015.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067491" comment="libreoffice-thesaurus-ro less than 20091130.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067492" comment="libreoffice-thesaurus-ru less than 20081013.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067493" comment="libreoffice-thesaurus-sk less than 20100208.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067494" comment="libreoffice-thesaurus-sl less than 20080601.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067495" comment="libreoffice-thesaurus-sv less than 20090624.1-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067496" comment="libreoffice-ure-devel-doc less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067497" comment="libreoffice-ure-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067498" comment="libreoffice-ure less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067499" comment="libreoffice-voikko less than 3.1.2-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067500" comment="libreoffice-writer-devel less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067501" comment="libreoffice-writer-extensions less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067502" comment="libreoffice-writer-l10n-prebuilt less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067503" comment="libreoffice-writer less than 3.3.1.2-2.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067504" comment="libreoffice less than 3.3.1.2-2.4.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067615" comment="myspell-african less than 20080701-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067616" comment="myspell-albanian less than 1.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067617" comment="myspell-american less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067618" comment="myspell-arabic less than 20080110-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067619" comment="myspell-assamese less than 1.0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067620" comment="myspell-asturian less than 0.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067621" comment="myspell-australian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067622" comment="myspell-austrian less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067623" comment="myspell-belarusian less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067624" comment="myspell-bengali less than 20080201-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067625" comment="myspell-brazilian less than 20100111-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067626" comment="myspell-breton less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067627" comment="myspell-british less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067628" comment="myspell-bulgarian less than 4.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067629" comment="myspell-canadian less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067630" comment="myspell-catalan less than 2.1.5-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067631" comment="myspell-chichewa less than 0.01-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067632" comment="myspell-croatian less than 20080813-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067633" comment="myspell-czech less than 20080822-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067634" comment="myspell-danish less than 20090925-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067635" comment="myspell-dutch less than 20091002-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067636" comment="myspell-esperanto less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067637" comment="myspell-estonian less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067638" comment="myspell-faroese less than 20070816-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067639" comment="myspell-french less than 20100125-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067640" comment="myspell-gaelic-scots less than 1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067641" comment="myspell-galician less than 20080515-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067642" comment="myspell-german less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067643" comment="myspell-greek less than 20041220-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067644" comment="myspell-gujarati less than 20061015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067645" comment="myspell-haitian less than 0.06-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067646" comment="myspell-hebrew less than 20080914-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067647" comment="myspell-hindi less than 20090617-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067648" comment="myspell-hungarian less than 20100329-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067649" comment="myspell-icelandic less than 20090823-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067650" comment="myspell-indonese less than 1.2-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067651" comment="myspell-irish less than 20080805-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067652" comment="myspell-italian less than 20081129-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067653" comment="myspell-khmer less than 1.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067654" comment="myspell-kichwa less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067655" comment="myspell-kikuyu less than 20091010-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067656" comment="myspell-kinyarwanda less than 20090218-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067657" comment="myspell-kiswahili less than 20040516-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067658" comment="myspell-kurdish less than 0.96.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067659" comment="myspell-latvian less than 20100419-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067660" comment="myspell-lithuanian less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067661" comment="myspell-macedonian less than 20051126-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067662" comment="myspell-maithili less than 20100107-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067663" comment="myspell-malagasy less than 0.03-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067664" comment="myspell-malay less than 20090808-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067665" comment="myspell-malayalam less than 1.1.0-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067666" comment="myspell-maory less than 20080630-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067667" comment="myspell-marathi less than 20091210-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067668" comment="myspell-mexican less than 20091103-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067669" comment="myspell-ndebele less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067670" comment="myspell-new-zealand less than 20081204-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067671" comment="myspell-norsk-bokmaal less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067672" comment="myspell-norsk-nynorsk less than 20080310-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067673" comment="myspell-nswiss less than 20091006-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067674" comment="myspell-occitan-lengadocian less than 0.6.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067675" comment="myspell-persian less than 20070815-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067676" comment="myspell-polish less than 20081206-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067677" comment="myspell-portuguese less than 20091015-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067678" comment="myspell-romanian less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067679" comment="myspell-russian less than 20081013-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067680" comment="myspell-setswana less than 20061023-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067681" comment="myspell-slovak less than 20100208-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067682" comment="myspell-slovene less than 20091130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067683" comment="myspell-sotho-northern less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067684" comment="myspell-south-african-english less than 20100316-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067685" comment="myspell-spanish-argentine less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067686" comment="myspell-spanish-bolivian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067687" comment="myspell-spanish-chilean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067688" comment="myspell-spanish-colombian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067689" comment="myspell-spanish-costa-rican less than 0.4-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067690" comment="myspell-spanish-dominican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067691" comment="myspell-spanish-ecuadorian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067692" comment="myspell-spanish-guatemalan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067693" comment="myspell-spanish-honduran less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067694" comment="myspell-spanish-nicaraguan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067695" comment="myspell-spanish-panamanian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067696" comment="myspell-spanish-paraguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067697" comment="myspell-spanish-peruvian less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067698" comment="myspell-spanish-puerto-rican less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067699" comment="myspell-spanish-salvadorean less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067700" comment="myspell-spanish-uruguayan less than 0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067701" comment="myspell-spanish-venezuelan less than 1.0.1-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067702" comment="myspell-spanish less than 20051029-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067703" comment="myspell-swati less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067704" comment="myspell-swedish-finland less than 20100131-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067705" comment="myspell-swedish less than 20100130-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067706" comment="myspell-tagalog less than 0.02-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067707" comment="myspell-thai less than 0.3-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067708" comment="myspell-tsonga less than 20060123-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067709" comment="myspell-ukrainian less than 20090818-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067710" comment="myspell-venda less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067711" comment="myspell-vietnamese less than 20091031-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067712" comment="myspell-welsh less than 20040425-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067713" comment="myspell-xhosa less than 20091030-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067714" comment="myspell-zulu less than 20091210-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4644</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4644" source="CVE"/>
	<description>
	Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.
	</description>
 </metadata>
<!-- 0ac79a390b8c314a5c62e76f50c46d2b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065872" comment="libsvn_auth_gnome_keyring-1-0 less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065873" comment="libsvn_auth_kwallet-1-0 less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065874" comment="subversion-devel less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065875" comment="subversion-perl less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065876" comment="subversion-python less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065877" comment="subversion-ruby less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065878" comment="subversion-server less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065879" comment="subversion-tools less than 1.6.9-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065880" comment="subversion less than 1.6.9-4.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4645</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4645" source="CVE"/>
	<description>
	strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4648</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4648" source="CVE"/>
	<description>
	The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4649</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4649" source="CVE"/>
	<description>
	Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4650</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4650" source="CVE"/>
	<description>
	Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4656</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4656" source="CVE"/>
	<description>
	The iowarrior_write function in drivers/usb/misc/iowarrior.c in the Linux kernel before 2.6.37 does not properly allocate memory, which might allow local users to trigger a heap-based buffer overflow, and consequently cause a denial of service or gain privileges, via a long report.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4661</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4661" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- b92fe4f408bc7d2c3f8042ce39713ccb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068009" comment="udisks-devel less than 1.0.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068010" comment="udisks less than 1.0.1-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4664</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4664" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 7b7bf5e7e0fb34e3ce6adf21e867d660 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068811" comment="ConsoleKit-32bit less than 0.4.1-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068812" comment="ConsoleKit-devel less than 0.4.1-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068813" comment="ConsoleKit-x11 less than 0.4.1-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068814" comment="ConsoleKit less than 0.4.1-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4665</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4665" source="CVE"/>
	<description>
	Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.
	</description>
 </metadata>
<!-- ecaa46248db2007ccc9934afefdef3f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067965" comment="libtiff-devel-32bit less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067966" comment="libtiff-devel less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067967" comment="libtiff3-32bit less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067968" comment="libtiff3 less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067969" comment="tiff less than 3.9.2-5.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4668</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4668" source="CVE"/>
	<description>
	The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.37-rc7 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device, related to an unaligned map.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4163.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4697</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4697" source="CVE"/>
	<description>
	Use-after-free vulnerability in the Zend engine in PHP before 5.2.15 and 5.3.x before 5.3.4 might allow context-dependent attackers to cause a denial of service (heap memory corruption) or have unspecified other impact via vectors related to use of __set, __get, __isset, and __unset methods on objects accessed by a reference.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4698</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4698" source="CVE"/>
	<description>
	Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4699</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4699" source="CVE"/>
	<description>
	The iconv_mime_decode_headers function in the Iconv extension in PHP before 5.3.4 does not properly handle encodings that are unrecognized by the iconv and mbstring (aka Multibyte String) implementations, which allows remote attackers to trigger an incomplete output array, and possibly bypass spam detection or have unspecified other impact, via a crafted Subject header in an e-mail message, as demonstrated by the ks_c_5601-1987 character set.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4700</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4700" source="CVE"/>
	<description>
	The set_magic_quotes_runtime function in PHP 5.3.2 and 5.3.3, when the MySQLi extension is used, does not properly interact with use of the mysqli_fetch_assoc function, which might make it easier for context-dependent attackers to conduct SQL injection attacks via crafted input that had been properly handled in earlier PHP versions.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4777</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2010-4777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4777" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 2cf658f7441dc8449cec268519371ea0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068433" comment="perl-32bit less than 5.12.1-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068434" comment="perl-base-32bit less than 5.12.1-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068435" comment="perl-base less than 5.12.1-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068436" comment="perl-doc less than 5.12.1-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068437" comment="perl less than 5.12.1-2.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0010</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010" source="CVE"/>
	<description>
	check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.
	</description>
 </metadata>
<!-- b05a056023e5bcac49ebdc63eaaf47c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065550" comment="sudo less than 1.7.2p7-2.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0013</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0013" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
	</description>
 </metadata>
<!-- 05603f3a64fc81196dd8aea9696233f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065925" comment="tomcat6-admin-webapps less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065926" comment="tomcat6-docs-webapp less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065927" comment="tomcat6-el-1_0-api less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065928" comment="tomcat6-javadoc less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065929" comment="tomcat6-jsp-2_1-api less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065930" comment="tomcat6-lib less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065931" comment="tomcat6-servlet-2_5-api less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065932" comment="tomcat6-webapps less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065933" comment="tomcat6 less than 6.0.24-5.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0014</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0014" source="CVE"/>
	<description>
	ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability."
	</description>
 </metadata>
<!-- 2b0bba5735c447165b94d23f27462cb0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066563" comment="libopenssl-devel less than 1.0.0-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066564" comment="libopenssl0_9_8-32bit less than 0.9.8m-3.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066565" comment="libopenssl0_9_8 less than 0.9.8m-3.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066566" comment="libopenssl1_0_0-32bit less than 1.0.0-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066567" comment="libopenssl1_0_0 less than 1.0.0-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066568" comment="openssl-doc less than 1.0.0-6.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066569" comment="openssl less than 1.0.0-6.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0017</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0017" source="CVE"/>
	<description>
	The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
	</description>
 </metadata>
<!-- f3f0c7e1fdbf64703d39ba1dd52c417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065734" comment="exim less than 4.71-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065735" comment="eximon less than 4.71-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065736" comment="eximstats-html less than 4.71-4.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0020</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0020" source="CVE"/>
	<description>
	Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object.
	</description>
 </metadata>
<!-- d6abaa5121d5e2b3545eaaf1d1051a49 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066480" comment="pango-32bit less than 1.28.0-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066481" comment="pango-devel less than 1.28.0-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066482" comment="pango-module-thai-lang less than 1.28.0-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066483" comment="pango less than 1.28.0-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0025</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0025" source="CVE"/>
	<description>
	IcedTea 1.7 before 1.7.8, 1.8 before 1.8.5, and 1.9 before 1.9.5 does not properly verify signatures for JAR files that (1) are "partially signed" or (2) signed by multiple entities, which allows remote attackers to trick users into executing code that appears to come from a trusted source.
	</description>
 </metadata>
<!-- 22ee7e63f03a7972c8a11cec72942dde -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065722" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.5-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065723" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.5-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065724" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.5-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065725" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.5-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065726" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.5-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065727" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.5-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0051</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0051" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, does not properly handle certain recursive eval calls, which makes it easier for remote attackers to force a user to respond positively to a dialog question, as demonstrated by a question about granting privileges.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0053</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0053" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0054</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0054" source="CVE"/>
	<description>
	Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving non-local JavaScript variables, aka an "upvarMap" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0055</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0055" source="CVE"/>
	<description>
	Use-after-free vulnerability in the JSON.stringify method in js3250.dll in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via unspecified vectors related to the js_HasOwnProperty function and garbage collection.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0056</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0056" source="CVE"/>
	<description>
	Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving exception timing and a large number of string values, aka an "atom map" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0057</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0057" source="CVE"/>
	<description>
	Use-after-free vulnerability in the Web Workers implementation in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to execute arbitrary code via vectors related to a JavaScript Worker and garbage collection.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0058</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0058" source="CVE"/>
	<description>
	Buffer overflow in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long string that triggers construction of a long text run.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0059</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0059" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0061</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0061" source="CVE"/>
	<description>
	Buffer overflow in Mozilla Firefox 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0062</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0062" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.14 and Thunderbird 3.1.x before 3.1.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f4bdebc8d07494856b7f28190f03348 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066074" comment="seamonkey-dom-inspector less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066075" comment="seamonkey-irc less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066104" comment="seamonkey-translations-common less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066105" comment="seamonkey-translations-other less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066076" comment="seamonkey-venkman less than 2.0.12-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066077" comment="seamonkey less than 2.0.12-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 40b2da5c59a31ab6766059fda7dc182a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066078" comment="MozillaThunderbird-devel less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066079" comment="MozillaThunderbird-translations-common less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066080" comment="MozillaThunderbird-translations-other less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066081" comment="MozillaThunderbird less than 3.1.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066082" comment="enigmail less than 1.1.2-9.7.1"/>
		</criteria>
	</criteria>
	<!-- 9fdd866f83a73a80a04ef10f7c8b01dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066106" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066107" comment="MozillaFirefox-translations-common less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066108" comment="MozillaFirefox-translations-other less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066068" comment="MozillaFirefox less than 3.6.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066109" comment="mozilla-js192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066110" comment="mozilla-js192 less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066069" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066111" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066112" comment="mozilla-xulrunner192-devel less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066113" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066070" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066114" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066115" comment="mozilla-xulrunner192-translations-common less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066116" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066117" comment="mozilla-xulrunner192-translations-other less than 1.9.2.15-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066073" comment="mozilla-xulrunner192 less than 1.9.2.15-0.2.1"/>
		</criteria>
	</criteria>
	<!-- b24f856008f7c6cade73beb41d6114a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066062" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066099" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066100" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066063" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066101" comment="mozilla-xulrunner191-translations-common less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066102" comment="mozilla-xulrunner191-translations-other less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066066" comment="mozilla-xulrunner191 less than 1.9.1.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066103" comment="python-xpcom191 less than 1.9.1.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0064</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0064" source="CVE"/>
	<description>
	The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted OpenType font data that triggers use of an incorrect index.
	</description>
 </metadata>
<!-- d6abaa5121d5e2b3545eaaf1d1051a49 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066480" comment="pango-32bit less than 1.28.0-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066481" comment="pango-devel less than 1.28.0-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066482" comment="pango-module-thai-lang less than 1.28.0-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066483" comment="pango less than 1.28.0-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0065</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0065" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0066</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0066" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mObserverList.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0067</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0067" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly implement autocompletion for forms, which allows remote attackers to read form history entries via a Java applet that spoofs interaction with the autocomplete controls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0069</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0069" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0070.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
	<!-- d1a23fda51026bc482ad48c722d76c45 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068260" comment="MozillaThunderbird-devel less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068261" comment="MozillaThunderbird-translations-common less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068262" comment="MozillaThunderbird-translations-other less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068263" comment="MozillaThunderbird less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068264" comment="enigmail less than 1.1.2-9.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0070</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0070" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0069.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
	<!-- d1a23fda51026bc482ad48c722d76c45 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068260" comment="MozillaThunderbird-devel less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068261" comment="MozillaThunderbird-translations-common less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068262" comment="MozillaThunderbird-translations-other less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068263" comment="MozillaThunderbird less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068264" comment="enigmail less than 1.1.2-9.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0071</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0071" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 on Windows allows remote attackers to determine the existence of arbitrary files, and possibly load resources, via vectors involving a resource: URL.
	</description>
 </metadata>
<!-- 91261decc838a409e40eb3b194bfaa92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0072</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0072" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
	<!-- d1a23fda51026bc482ad48c722d76c45 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068260" comment="MozillaThunderbird-devel less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068261" comment="MozillaThunderbird-translations-common less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068262" comment="MozillaThunderbird-translations-other less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068263" comment="MozillaThunderbird less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068264" comment="enigmail less than 1.1.2-9.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0073</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0073" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly use nsTreeRange data structures, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0074</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0074" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
	<!-- d1a23fda51026bc482ad48c722d76c45 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068260" comment="MozillaThunderbird-devel less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068261" comment="MozillaThunderbird-translations-common less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068262" comment="MozillaThunderbird-translations-other less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068263" comment="MozillaThunderbird less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068264" comment="enigmail less than 1.1.2-9.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0075</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0075" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0077, and CVE-2011-0078.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
	<!-- d1a23fda51026bc482ad48c722d76c45 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068260" comment="MozillaThunderbird-devel less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068261" comment="MozillaThunderbird-translations-common less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068262" comment="MozillaThunderbird-translations-other less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068263" comment="MozillaThunderbird less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068264" comment="enigmail less than 1.1.2-9.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0076</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0076" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, on Mac OS X allows remote attackers to bypass intended access restrictions via unknown vectors.
	</description>
 </metadata>
<!-- 91261decc838a409e40eb3b194bfaa92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0077</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0077" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0078.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
	<!-- d1a23fda51026bc482ad48c722d76c45 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068260" comment="MozillaThunderbird-devel less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068261" comment="MozillaThunderbird-translations-common less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068262" comment="MozillaThunderbird-translations-other less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068263" comment="MozillaThunderbird less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068264" comment="enigmail less than 1.1.2-9.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0078</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0078" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0077.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
	<!-- d1a23fda51026bc482ad48c722d76c45 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068260" comment="MozillaThunderbird-devel less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068261" comment="MozillaThunderbird-translations-common less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068262" comment="MozillaThunderbird-translations-other less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068263" comment="MozillaThunderbird less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068264" comment="enigmail less than 1.1.2-9.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0080</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0080" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
	<!-- d1a23fda51026bc482ad48c722d76c45 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068260" comment="MozillaThunderbird-devel less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068261" comment="MozillaThunderbird-translations-common less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068262" comment="MozillaThunderbird-translations-other less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068263" comment="MozillaThunderbird less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068264" comment="enigmail less than 1.1.2-9.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0081</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0081" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.17 and 4.x before 4.0.1, and Thunderbird 3.1.x before 3.1.10, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 5a5d9947a0c2941da924f9dc58ef5195 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068241" comment="seamonkey-dom-inspector less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068242" comment="seamonkey-irc less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068265" comment="seamonkey-translations-common less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068266" comment="seamonkey-translations-other less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068243" comment="seamonkey-venkman less than 2.0.14-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068244" comment="seamonkey less than 2.0.14-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
	<!-- d1a23fda51026bc482ad48c722d76c45 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068260" comment="MozillaThunderbird-devel less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068261" comment="MozillaThunderbird-translations-common less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068262" comment="MozillaThunderbird-translations-other less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068263" comment="MozillaThunderbird less than 3.1.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068264" comment="enigmail less than 1.1.2-9.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0083</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0083" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0084</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0084" source="CVE"/>
	<description>
	The SVGTextElement.getCharNumAtPosition function in Mozilla Firefox before 3.6.20, and 4.x through 5; Thunderbird 3.x before 3.1.12 and other versions before 6; SeaMonkey 2.x before 2.3; and possibly other products does not properly handle SVG text, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 521e57c67c81daf4b0ad3b877ae01d21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070062" comment="seamonkey-dom-inspector less than 2.3-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070063" comment="seamonkey-irc less than 2.3-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070064" comment="seamonkey-translations-common less than 2.3-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070065" comment="seamonkey-translations-other less than 2.3-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070066" comment="seamonkey-venkman less than 2.3-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070067" comment="seamonkey less than 2.3-2.2.1"/>
		</criteria>
	</criteria>
	<!-- 7e280d5e296b096ea886856af521c756 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070068" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070069" comment="MozillaFirefox-translations-common less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070070" comment="MozillaFirefox-translations-other less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070071" comment="MozillaFirefox less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070072" comment="mozilla-js192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070073" comment="mozilla-js192 less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070074" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070075" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070076" comment="mozilla-xulrunner192-devel less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070077" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070078" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070079" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070080" comment="mozilla-xulrunner192-translations-common less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070081" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070082" comment="mozilla-xulrunner192-translations-other less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070083" comment="mozilla-xulrunner192 less than 1.9.2.20-1.2.1"/>
		</criteria>
	</criteria>
	<!-- fb1b8b9a1da94e992f85d96a9e86ce6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070096" comment="MozillaThunderbird-devel less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070097" comment="MozillaThunderbird-translations-common less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070098" comment="MozillaThunderbird-translations-other less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070099" comment="MozillaThunderbird less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070100" comment="enigmail less than 1.1.2+3.1.12-0.15.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0085</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0085" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0188</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0188" source="CVE"/>
	<description>
	The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
	</description>
 </metadata>
<!-- f055e48d182b6f7f608cb8ff6aeb2fde -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068621" comment="ruby-devel less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068622" comment="ruby-doc-html less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068623" comment="ruby-doc-ri less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068624" comment="ruby-examples less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068625" comment="ruby-test-suite less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068626" comment="ruby-tk less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068627" comment="ruby less than 1.8.7.p249-8.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0191</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0191" source="CVE"/>
	<description>
	Buffer overflow in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with JPEG encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 357af51e82a80d6aba64b77f549cfeb4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066185" comment="libtiff-devel-32bit less than 3.9.2-5.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066186" comment="libtiff-devel less than 3.9.2-5.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066187" comment="libtiff3-32bit less than 3.9.2-5.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066188" comment="libtiff3 less than 3.9.2-5.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066189" comment="tiff less than 3.9.2-5.6.1"/>
		</criteria>
	</criteria>
	<!-- f01566cf081c054148f1ca4c3bd88ebf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0192</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192" source="CVE"/>
	<description>
	Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 357af51e82a80d6aba64b77f549cfeb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066185" comment="libtiff-devel-32bit less than 3.9.2-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066186" comment="libtiff-devel less than 3.9.2-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066187" comment="libtiff3-32bit less than 3.9.2-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066188" comment="libtiff3 less than 3.9.2-5.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066189" comment="tiff less than 3.9.2-5.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0226</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226" source="CVE"/>
	<description>
	Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.
	</description>
 </metadata>
<!-- be8a220f4896f52e698d9ef9401d85aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069570" comment="freetype2-devel-32bit less than 2.3.12-7.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069571" comment="freetype2-devel less than 2.3.12-7.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069572" comment="libfreetype6-32bit less than 2.3.12-7.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069573" comment="libfreetype6 less than 2.3.12-7.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0281</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281" source="CVE"/>
	<description>
	The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.
	</description>
 </metadata>
<!-- 89ed397dfe1689f37817bd0e1028920f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065778" comment="krb5-32bit less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065779" comment="krb5-client less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065780" comment="krb5-devel-32bit less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065781" comment="krb5-devel less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065782" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065783" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065784" comment="krb5-server less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065785" comment="krb5 less than 1.8.1-5.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0282</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282" source="CVE"/>
	<description>
	The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.
	</description>
 </metadata>
<!-- 89ed397dfe1689f37817bd0e1028920f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065778" comment="krb5-32bit less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065779" comment="krb5-client less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065780" comment="krb5-devel-32bit less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065781" comment="krb5-devel less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065782" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065783" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065784" comment="krb5-server less than 1.8.1-5.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065785" comment="krb5 less than 1.8.1-5.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0284</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284" source="CVE"/>
	<description>
	Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
	</description>
 </metadata>
<!-- 78a600cb874177bfaa3ad1a821054329 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066209" comment="krb5-32bit less than 1.8.1-5.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066210" comment="krb5-client less than 1.8.1-5.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066211" comment="krb5-devel-32bit less than 1.8.1-5.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066212" comment="krb5-devel less than 1.8.1-5.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066213" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066214" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066215" comment="krb5-server less than 1.8.1-5.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066216" comment="krb5 less than 1.8.1-5.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0285</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285" source="CVE"/>
	<description>
	The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.
	</description>
 </metadata>
<!-- 599e58d17aa27f5a63186a0e47be999e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067715" comment="krb5-32bit less than 1.8.1-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067716" comment="krb5-client less than 1.8.1-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067717" comment="krb5-devel-32bit less than 1.8.1-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067718" comment="krb5-devel less than 1.8.1-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067719" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067720" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067721" comment="krb5-server less than 1.8.1-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067722" comment="krb5 less than 1.8.1-5.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0411</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0411" source="CVE"/>
	<description>
	The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 23e332ce25553e0d0b25952f64974883 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067810" comment="postfix-devel less than 2.7.1-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067811" comment="postfix-doc less than 2.7.1-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067812" comment="postfix-mysql less than 2.7.1-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067813" comment="postfix-postgresql less than 2.7.1-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067814" comment="postfix less than 2.7.1-2.4.1"/>
		</criteria>
	</criteria>
	<!-- 6ce89e5d50d91911ef32744eb80138d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068438" comment="pure-ftpd less than 1.0.29-2.3.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0413</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0413" source="CVE"/>
	<description>
	The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.
	</description>
 </metadata>
<!-- d3f3e518922136ec6050f3f4c4bae37b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065716" comment="dhcp-client less than 4.1.2.ESV.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065717" comment="dhcp-devel less than 4.1.2.ESV.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065718" comment="dhcp-doc less than 4.1.2.ESV.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065719" comment="dhcp-relay less than 4.1.2.ESV.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065720" comment="dhcp-server less than 4.1.2.ESV.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065721" comment="dhcp less than 4.1.2.ESV.1-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0414</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0414" source="CVE"/>
	<description>
	ISC BIND 9.7.1 through 9.7.2-P3, when configured as an authoritative server, allows remote attackers to cause a denial of service (deadlock and daemon hang) by sending a query at the time of (1) an IXFR transfer or (2) a DDNS update.
	</description>
 </metadata>
<!-- e9ec624b2168a52c0d050355dae2987c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065881" comment="bind-chrootenv less than 9.7.3-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065882" comment="bind-devel less than 9.7.3-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065883" comment="bind-doc less than 9.7.3-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065884" comment="bind-libs-32bit less than 9.7.3-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065885" comment="bind-libs less than 9.7.3-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065886" comment="bind-utils less than 9.7.3-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065887" comment="bind less than 9.7.3-1.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0419</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419" source="CVE"/>
	<description>
	Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
	</description>
 </metadata>
<!-- 79f2b3c814fddec22bbc71334e59bc37 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069596" comment="apache2-devel less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069597" comment="apache2-doc less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069598" comment="apache2-example-certificates less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069599" comment="apache2-example-pages less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069600" comment="apache2-itk less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069601" comment="apache2-prefork less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069602" comment="apache2-utils less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069603" comment="apache2-worker less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069604" comment="apache2 less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069605" comment="libapr-util1-dbd-mysql less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069606" comment="libapr-util1-dbd-pgsql less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069607" comment="libapr-util1-dbd-sqlite3 less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069608" comment="libapr-util1-devel less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069609" comment="libapr-util1 less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069610" comment="libapr1-devel less than 1.3.8-8.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069611" comment="libapr1 less than 1.3.8-8.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0420</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0420" source="CVE"/>
	<description>
	The grapheme_extract function in the Internationalization extension (Intl) for ICU for PHP 5.3.5 allows context-dependent attackers to cause a denial of service (crash) via an invalid size argument, which triggers a NULL pointer dereference.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0421</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0421" source="CVE"/>
	<description>
	The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service (NULL pointer dereference) via an empty ZIP archive that is processed with a (1) locateName or (2) statName operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37c8ea0c799c88fd6f13a46be975221c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068862" comment="apache2-mod_php5 less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068863" comment="php5-bcmath less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068864" comment="php5-bz2 less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068865" comment="php5-calendar less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068866" comment="php5-ctype less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068867" comment="php5-curl less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068868" comment="php5-dba less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068869" comment="php5-devel less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068870" comment="php5-dom less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068871" comment="php5-enchant less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068872" comment="php5-exif less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068873" comment="php5-fastcgi less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068874" comment="php5-fileinfo less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068875" comment="php5-ftp less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068876" comment="php5-gd less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068877" comment="php5-gettext less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068878" comment="php5-gmp less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068879" comment="php5-hash less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068880" comment="php5-iconv less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068881" comment="php5-imap less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068882" comment="php5-intl less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068883" comment="php5-json less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068884" comment="php5-ldap less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068885" comment="php5-mbstring less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068886" comment="php5-mcrypt less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068887" comment="php5-mysql less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068888" comment="php5-odbc less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068889" comment="php5-openssl less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068890" comment="php5-pcntl less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068891" comment="php5-pdo less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068892" comment="php5-pear less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068893" comment="php5-pgsql less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068894" comment="php5-phar less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068895" comment="php5-posix less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068896" comment="php5-pspell less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068897" comment="php5-readline less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068898" comment="php5-shmop less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068899" comment="php5-snmp less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068900" comment="php5-soap less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068901" comment="php5-sockets less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068902" comment="php5-sqlite less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068903" comment="php5-suhosin less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068904" comment="php5-sysvmsg less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068905" comment="php5-sysvsem less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068906" comment="php5-sysvshm less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068907" comment="php5-tidy less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068908" comment="php5-tokenizer less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068909" comment="php5-wddx less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068910" comment="php5-xmlreader less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068911" comment="php5-xmlrpc less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068912" comment="php5-xmlwriter less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068913" comment="php5-xsl less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068914" comment="php5-zip less than 5.3.3-0.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068915" comment="php5-zlib less than 5.3.3-0.19.1"/>
		</criteria>
	</criteria>
	<!-- 5131b3e23ea7ff4fc456ecf345a4a61c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068341" comment="libzip-devel less than 0.9-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068342" comment="libzip-util less than 0.9-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068343" comment="libzip1 less than 0.9-27.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0433</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0433" source="CVE"/>
	<description>
	Heap-based buffer overflow in the linetoken function in afmparse.c in t1lib, as used in teTeX 3.0.x, GNOME evince, and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a DVI file containing a crafted Adobe Font Metrics (AFM) file, a different vulnerability than CVE-2010-2642.
	</description>
 </metadata>
<!-- 91ad8179619f085b1bff0b74be23860a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066843" comment="evince-devel less than 2.30.1-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066844" comment="evince-lang less than 2.30.1-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066845" comment="evince less than 2.30.1-3.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066846" comment="nautilus-evince less than 2.30.1-3.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0446</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0446" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the mail_to helper in Ruby on Rails before 2.3.11, and 3.x before 3.0.4, when javascript encoding is used, allow remote attackers to inject arbitrary web script or HTML via a crafted (1) name or (2) email value.
	</description>
 </metadata>
<!-- e7571c569adf76cb0d4b776f86783aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072125" comment="rubygem-actionmailer-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072126" comment="rubygem-actionmailer less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072127" comment="rubygem-actionpack-2_3 less than 2.3.14-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072128" comment="rubygem-actionpack less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072129" comment="rubygem-activerecord-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072130" comment="rubygem-activerecord less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072131" comment="rubygem-activeresource-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072132" comment="rubygem-activeresource less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072133" comment="rubygem-activesupport-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072134" comment="rubygem-activesupport less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072135" comment="rubygem-rack less than 1.1.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072136" comment="rubygem-rails-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072137" comment="rubygem-rails less than 2.3.14-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0447</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0447" source="CVE"/>
	<description>
	Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
	</description>
 </metadata>
<!-- e7571c569adf76cb0d4b776f86783aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072125" comment="rubygem-actionmailer-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072126" comment="rubygem-actionmailer less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072127" comment="rubygem-actionpack-2_3 less than 2.3.14-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072128" comment="rubygem-actionpack less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072129" comment="rubygem-activerecord-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072130" comment="rubygem-activerecord less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072131" comment="rubygem-activeresource-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072132" comment="rubygem-activeresource less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072133" comment="rubygem-activesupport-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072134" comment="rubygem-activesupport less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072135" comment="rubygem-rack less than 1.1.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072136" comment="rubygem-rails-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072137" comment="rubygem-rails less than 2.3.14-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0448</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0448" source="CVE"/>
	<description>
	Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.
	</description>
 </metadata>
<!-- e7571c569adf76cb0d4b776f86783aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072125" comment="rubygem-actionmailer-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072126" comment="rubygem-actionmailer less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072127" comment="rubygem-actionpack-2_3 less than 2.3.14-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072128" comment="rubygem-actionpack less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072129" comment="rubygem-activerecord-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072130" comment="rubygem-activerecord less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072131" comment="rubygem-activeresource-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072132" comment="rubygem-activeresource less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072133" comment="rubygem-activesupport-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072134" comment="rubygem-activesupport less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072135" comment="rubygem-rack less than 1.1.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072136" comment="rubygem-rails-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072137" comment="rubygem-rails less than 2.3.14-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0449</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0449" source="CVE"/>
	<description>
	actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.
	</description>
 </metadata>
<!-- e7571c569adf76cb0d4b776f86783aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072125" comment="rubygem-actionmailer-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072126" comment="rubygem-actionmailer less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072127" comment="rubygem-actionpack-2_3 less than 2.3.14-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072128" comment="rubygem-actionpack less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072129" comment="rubygem-activerecord-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072130" comment="rubygem-activerecord less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072131" comment="rubygem-activeresource-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072132" comment="rubygem-activeresource less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072133" comment="rubygem-activesupport-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072134" comment="rubygem-activesupport less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072135" comment="rubygem-rack less than 1.1.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072136" comment="rubygem-rails-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072137" comment="rubygem-rails less than 2.3.14-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0460</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0460" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 94dd37ae4da6c55a55a96c2c142660e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067748" comment="kbd less than 1.14.1-31.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0461</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0461" source="CVE"/>
	<description>
	/etc/init.d/boot.localfs in the aaa_base package before 11.2-43.48.1 in SUSE openSUSE 11.2, and before 11.3-8.7.1 in openSUSE 11.3, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/mtab.
	</description>
 </metadata>
<!-- 56710fbf333ba396b2cd7ef7b9eddf3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066133" comment="aaa_base less than 11.3-8.7.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0465</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465" source="CVE"/>
	<description>
	xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
	</description>
 </metadata>
<!-- b669058739aa03c68e584cf741d7488a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066967" comment="xorg-x11-xauth less than 7.5-12.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066968" comment="xorg-x11 less than 7.5-12.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0468</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0468" source="CVE"/>
	<description>
	The aaa_base package before 11.3-8.9.1 in SUSE openSUSE 11.3, and before 11.4-54.62.1 in openSUSE 11.4, allows local users to gain privileges via shell metacharacters in a filename, related to tab expansion.
	</description>
 </metadata>
<!-- c7d313e1aff6279e40b708930c181922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066418" comment="aaa_base less than 11.3-8.9.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0482</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0482" source="CVE"/>
	<description>
	Google Chrome before 8.0.552.237 and Chrome OS before 8.0.552.344 do not properly perform a cast of an unspecified variable during handling of anchors, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted HTML document.
	</description>
 </metadata>
<!-- 30b39a83dbb36ff2cc8542600c268763 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068428" comment="libwebkit-1_0-2-32bit less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068429" comment="libwebkit-1_0-2 less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068430" comment="libwebkit-devel less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068431" comment="libwebkit-lang less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068432" comment="webkit-jsc less than 1.2.7-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0521</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0521" source="CVE"/>
	<description>
	The dvb_ca_ioctl function in drivers/media/dvb/ttpci/av7110_ca.c in the Linux kernel before 2.6.38-rc2 does not check the sign of a certain integer field, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a negative value.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0530</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0530" source="CVE"/>
	<description>
	Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request.  NOTE: this issue exists because of a CVE-2005-3534 regression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9916013cd20dec1f56fad723f0aa16ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066207" comment="nbd-doc less than 2.9.20-1.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066208" comment="nbd less than 2.9.20-1.3.1"/>
		</criteria>
	</criteria>
	<!-- bb2c9e2bf7d4fce6f9c1cea63f88604b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067264" comment="nbd-doc less than 2.9.20-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067265" comment="nbd less than 2.9.20-1.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0534</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0534" source="CVE"/>
	<description>
	Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.
	</description>
 </metadata>
<!-- 05603f3a64fc81196dd8aea9696233f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065925" comment="tomcat6-admin-webapps less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065926" comment="tomcat6-docs-webapp less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065927" comment="tomcat6-el-1_0-api less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065928" comment="tomcat6-javadoc less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065929" comment="tomcat6-jsp-2_1-api less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065930" comment="tomcat6-lib less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065931" comment="tomcat6-servlet-2_5-api less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065932" comment="tomcat6-webapps less than 6.0.24-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065933" comment="tomcat6 less than 6.0.24-5.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0541</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0541" source="CVE"/>
	<description>
	fuse 2.8.5 and earlier does not properly handle when /etc/mtab cannot be updated, which allows local users to unmount arbitrary directories via a symlink attack.
	</description>
 </metadata>
<!-- 5d434b6485c2304298f396868f22e809 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066692" comment="fuse-devel-static less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066693" comment="fuse-devel less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066694" comment="fuse less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066695" comment="libblkid-devel-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066696" comment="libblkid-devel less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066697" comment="libblkid1-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066698" comment="libblkid1 less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066699" comment="libfuse2-32bit less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066700" comment="libfuse2 less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066701" comment="libuuid-devel-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066702" comment="libuuid-devel less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066703" comment="libuuid1-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066704" comment="libuuid1 less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066705" comment="util-linux-lang less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066706" comment="util-linux less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066707" comment="uuidd less than 2.17.2-6.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0543</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0543" source="CVE"/>
	<description>
	Certain legacy functionality in fusermount in fuse 2.8.5 and earlier, when util-linux does not support the --no-canonicalize option, allows local users to bypass intended access restrictions and unmount arbitrary directories via a symlink attack.
	</description>
 </metadata>
<!-- 5d434b6485c2304298f396868f22e809 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066692" comment="fuse-devel-static less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066693" comment="fuse-devel less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066694" comment="fuse less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066695" comment="libblkid-devel-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066696" comment="libblkid-devel less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066697" comment="libblkid1-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066698" comment="libblkid1 less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066699" comment="libfuse2-32bit less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066700" comment="libfuse2 less than 2.8.5-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066701" comment="libuuid-devel-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066702" comment="libuuid-devel less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066703" comment="libuuid1-32bit less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066704" comment="libuuid1 less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066705" comment="util-linux-lang less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066706" comment="util-linux less than 2.17.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066707" comment="uuidd less than 2.17.2-6.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0558</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0558" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code via a large array length value in the ActionScript method of the Function class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0559</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0559" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted parameters to an unspecified ActionScript method that cause a parameter to be used as an object pointer, a different vulnerability than CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0560</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0560" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0561</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0561" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0562</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0562" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2011-0570 and CVE-2011-0588.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0563</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0563" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0589 and CVE-2011-0606.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0565</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0565" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0585.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0566</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0566" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image, a different vulnerability than CVE-2011-0567 and CVE-2011-0603.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0567</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0567" source="CVE"/>
	<description>
	AcroRd32.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image that triggers an incorrect pointer calculation, leading to heap memory corruption, a different vulnerability than CVE-2011-0566 and CVE-2011-0603.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0570</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0570" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2011-0562 and CVE-2011-0588.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0571</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0571" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0572</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0572" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0573</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0573" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0574, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0574</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0574" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0578, CVE-2011-0607, and CVE-2011-0608.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0575</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0575" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Flash Player before 10.2.152.26 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0577</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0577" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player before 10.2.152.26 allows remote attackers to execute arbitrary code via a crafted font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0578</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0578" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to a constructor for an unspecified ActionScript3 object and improper type checking, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0607, and CVE-2011-0608.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0585</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0585" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0565.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0586</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0586" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X do not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0587</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0587" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-0604.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0588</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0588" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2011-0562 and CVE-2011-0570.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0589</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0589" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0563 and CVE-2011-0606.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- 09dccba364ff2be6f4837c463bd2e92e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0590</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0590" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a 3D file, a different vulnerability than CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, CVE-2011-0595, and CVE-2011-0600.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0591</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0591" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, related to Texture and rgba, a different vulnerability than CVE-2011-0590, CVE-2011-0592, CVE-2011-0593, CVE-2011-0595, and CVE-2011-0600.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0592</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0592" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, related to "Texture bmp," a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0593, CVE-2011-0595, and CVE-2011-0600.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0593</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0593" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0595, and CVE-2011-0600.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0594</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0594" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a font.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0595</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0595" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, and CVE-2011-0600.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0596</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0596" source="CVE"/>
	<description>
	The Bitmap parsing component in 2d.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via an image with crafted (1) height and (2) width values for an RLE_8 compressed bitmap, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-0598, CVE-2011-0599, and CVE-2011-0602.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0598</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0598" source="CVE"/>
	<description>
	Integer overflow in ACE.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code via crafted ICC data, a different vulnerability than CVE-2011-0596, CVE-2011-0599, and CVE-2011-0602.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0599</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0599" source="CVE"/>
	<description>
	The Bitmap parsing component in rt3d.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted image that causes an invalid pointer calculation related to 4/8-bit RLE compression, a different vulnerability than CVE-2011-0596, CVE-2011-0598, and CVE-2011-0602.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0600</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0600" source="CVE"/>
	<description>
	The U3D component in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a 3D file with an invalid Parent Node count that triggers an incorrect size calculation and memory corruption, a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, and CVE-2011-0595.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0602</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0602" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via crafted JP2K record types in a JPEG2000 image in a PDF file, which causes heap corruption, a different vulnerability than CVE-2011-0596, CVE-2011-0598, and CVE-2011-0599.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0603</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0603" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image, a different vulnerability than CVE-2011-0566 and CVE-2011-0567.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0604</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0604" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-0587.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0606</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0606" source="CVE"/>
	<description>
	Stack-based buffer overflow in rt3d.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to a crafted length value, a different vulnerability than CVE-2011-0563 and CVE-2011-0589.
	</description>
 </metadata>
<!-- 026bb5ef15ed0afaf4f271f909038865 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0607</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0607" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, and CVE-2011-0608.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0608</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0608" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.152.26 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0559, CVE-2011-0560, CVE-2011-0561, CVE-2011-0571, CVE-2011-0572, CVE-2011-0573, CVE-2011-0574, CVE-2011-0578, and CVE-2011-0607.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026bb5ef15ed0afaf4f271f909038865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065965" comment="acroread less than 9.4.2-0.2.1"/>
	</criteria>
	<!-- bd862adf1877d983d06f3926ea8d6cfa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065767" comment="flash-player less than 10.2.152.26-0.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0609</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0609" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0b644aa4547633317ae22ed9a031fc28 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066425" comment="flash-player less than 10.2.153.1-0.2.1"/>
	</criteria>
	<!-- 148fe6d84695ba070dc7dccc516f71c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066588" comment="flash-player less than 10.2.153.1-0.4.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0611</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0611" source="CVE"/>
	<description>
	Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.
	</description>
 </metadata>
<!-- e10665d4c8a3201533909053f2ba6831 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067740" comment="flash-player less than 10.2.159.1-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0618</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0618" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 09dccba364ff2be6f4837c463bd2e92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0619</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0619" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0620, CVE-2011-0621, and CVE-2011-0622.
	</description>
 </metadata>
<!-- 09dccba364ff2be6f4837c463bd2e92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0620</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0620" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0619, CVE-2011-0621, and CVE-2011-0622.
	</description>
 </metadata>
<!-- 09dccba364ff2be6f4837c463bd2e92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0621</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0621" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0619, CVE-2011-0620, and CVE-2011-0622.
	</description>
 </metadata>
<!-- 09dccba364ff2be6f4837c463bd2e92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0622</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0622" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0619, CVE-2011-0620, and CVE-2011-0621.
	</description>
 </metadata>
<!-- 09dccba364ff2be6f4837c463bd2e92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0623</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0623" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors, related to a "bounds checking" issue, a different vulnerability than CVE-2011-0624, CVE-2011-0625, and CVE-2011-0626.
	</description>
 </metadata>
<!-- 09dccba364ff2be6f4837c463bd2e92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0624</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0624" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors, related to a "bounds checking" issue, a different vulnerability than CVE-2011-0623, CVE-2011-0625, and CVE-2011-0626.
	</description>
 </metadata>
<!-- 09dccba364ff2be6f4837c463bd2e92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0625</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0625" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors, related to a "bounds checking" issue, a different vulnerability than CVE-2011-0623, CVE-2011-0624, and CVE-2011-0626.
	</description>
 </metadata>
<!-- 09dccba364ff2be6f4837c463bd2e92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0626</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0626" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors, related to a "bounds checking" issue, a different vulnerability than CVE-2011-0623, CVE-2011-0624, and CVE-2011-0625.
	</description>
 </metadata>
<!-- 09dccba364ff2be6f4837c463bd2e92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0627</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0627" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content, as possibly exploited in the wild in May 2011 by a Microsoft Office document with an embedded .swf file.
	</description>
 </metadata>
<!-- 09dccba364ff2be6f4837c463bd2e92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068508" comment="flash-player less than 10.3.181.14-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0681</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0681" source="CVE"/>
	<description>
	The Cascading Style Sheets (CSS) Extensions for XML implementation in Opera before 11.01 recognizes links to javascript: URLs in the -o-link property, which makes it easier for remote attackers to bypass CSS filtering via a crafted URL.
	</description>
 </metadata>
<!-- 97169f79203f773144c3a819d72520d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065728" comment="opera-gtk less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065729" comment="opera-kde4 less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065730" comment="opera less than 11.01-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0682</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0682" source="CVE"/>
	<description>
	Integer truncation error in opera.dll in Opera before 11.01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML form with a select element that contains a large number of children.
	</description>
 </metadata>
<!-- 97169f79203f773144c3a819d72520d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065728" comment="opera-gtk less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065729" comment="opera-kde4 less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065730" comment="opera less than 11.01-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0683</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0683" source="CVE"/>
	<description>
	Opera before 11.01 does not properly restrict the use of opera: URLs, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.
	</description>
 </metadata>
<!-- 97169f79203f773144c3a819d72520d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065728" comment="opera-gtk less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065729" comment="opera-kde4 less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065730" comment="opera less than 11.01-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0684</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0684" source="CVE"/>
	<description>
	Opera before 11.01 does not properly handle redirections and unspecified other HTTP responses, which allows remote web servers to obtain sufficient access to local files to use these files as page resources, and consequently obtain potentially sensitive information from the contents of the files, via an unknown response manipulation.
	</description>
 </metadata>
<!-- 97169f79203f773144c3a819d72520d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065728" comment="opera-gtk less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065729" comment="opera-kde4 less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065730" comment="opera less than 11.01-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0685</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0685" source="CVE"/>
	<description>
	The Delete Private Data feature in Opera before 11.01 does not properly implement the "Clear all email account passwords" option, which might allow physically proximate attackers to access an e-mail account via an unattended workstation.
	</description>
 </metadata>
<!-- 97169f79203f773144c3a819d72520d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065728" comment="opera-gtk less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065729" comment="opera-kde4 less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065730" comment="opera less than 11.01-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0686</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0686" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.01 allows remote attackers to cause a denial of service (application crash) via unknown content on a web page, as demonstrated by vkontakte.ru.
	</description>
 </metadata>
<!-- 97169f79203f773144c3a819d72520d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065728" comment="opera-gtk less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065729" comment="opera-kde4 less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065730" comment="opera less than 11.01-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0687</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0687" source="CVE"/>
	<description>
	Opera before 11.01 does not properly implement Wireless Application Protocol (WAP) dropdown lists, which allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted WAP document.
	</description>
 </metadata>
<!-- 97169f79203f773144c3a819d72520d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065728" comment="opera-gtk less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065729" comment="opera-kde4 less than 11.01-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065730" comment="opera less than 11.01-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0706</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0706" source="CVE"/>
	<description>
	The JNLPClassLoader class in IcedTea-Web before 1.0.1, as used in OpenJDK Runtime Environment 1.6.0, allows remote attackers to gain privileges via unknown vectors related to multiple signers and the assignment of "an inappropriate security descriptor."
	</description>
 </metadata>
<!-- 4cae64c147405ced352b3a74c41b1c19 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065972" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065973" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065974" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065975" comment="java-1_6_0-openjdk-plugin less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065976" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b20.1.9.7-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065977" comment="java-1_6_0-openjdk less than 1.6.0.0_b20.1.9.7-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0707</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0707" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
	</description>
 </metadata>
<!-- 4b2b721d1b754e85fd46bd42ce5af4fe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066987" comment="mailman less than 2.1.14-6.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0708</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0708" source="CVE"/>
	<description>
	exif.c in the Exif extension in PHP before 5.3.6 on 64-bit platforms performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) via an image with a crafted Image File Directory (IFD) that triggers a buffer over-read.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0711</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711" source="CVE"/>
	<description>
	The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0712</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0712" source="CVE"/>
	<description>
	Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0715</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0715" source="CVE"/>
	<description>
	The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
	</description>
 </metadata>
<!-- 3060c0b0ae3a735f69def8adbf722b82 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069056" comment="libsvn_auth_gnome_keyring-1-0 less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069057" comment="libsvn_auth_kwallet-1-0 less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069058" comment="subversion-devel less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069059" comment="subversion-perl less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069060" comment="subversion-python less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069061" comment="subversion-ruby less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069062" comment="subversion-server less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069063" comment="subversion-tools less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069064" comment="subversion less than 1.6.9-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0719</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719" source="CVE"/>
	<description>
	Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
	</description>
 </metadata>
<!-- 7ee8f45280e85aeb3a84c77a0926680a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068011" comment="ldapsmb less than 1.34b-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068012" comment="libldb-devel less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068013" comment="libldb0 less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068014" comment="libnetapi-devel less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068015" comment="libnetapi0 less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068016" comment="libsmbclient-devel less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068017" comment="libsmbclient0-32bit less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068018" comment="libsmbclient0 less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068019" comment="libsmbsharemodes-devel less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068020" comment="libsmbsharemodes0 less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068021" comment="libtalloc-devel less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068022" comment="libtalloc2 less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068023" comment="libtdb-devel less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068024" comment="libtdb1-32bit less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068025" comment="libtdb1 less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068026" comment="libtevent-devel less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068027" comment="libtevent0 less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068028" comment="libwbclient-devel less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068029" comment="libwbclient0-32bit less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068030" comment="libwbclient0 less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068031" comment="samba-32bit less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068032" comment="samba-client-32bit less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068033" comment="samba-client less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068034" comment="samba-devel less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068035" comment="samba-doc less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068036" comment="samba-krb-printing less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068037" comment="samba-winbind-32bit less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068038" comment="samba-winbind less than 3.5.4-5.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068039" comment="samba less than 3.5.4-5.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0727</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0727" source="CVE"/>
	<description>
	GNOME Display Manager (gdm) 2.x before 2.32.1 allows local users to change the ownership of arbitrary files via a symlink attack on a (1) dmrc or (2) face icon file under /var/cache/gdm/.
	</description>
 </metadata>
<!-- 31570a6579bd3f777114a502ce59c28e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066847" comment="gdm-branding-upstream less than 2.30.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066848" comment="gdm-lang less than 2.30.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066849" comment="gdm less than 2.30.2-6.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066850" comment="gnome-applets-gdm less than 2.30.2-6.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0752</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0752" source="CVE"/>
	<description>
	The extract function in PHP before 5.2.15 does not prevent use of the EXTR_OVERWRITE parameter to overwrite (1) the GLOBALS superglobal array and (2) the this variable, which allows context-dependent attackers to bypass intended access restrictions by modifying data structures that were not intended to depend on external input, a related issue to CVE-2005-2691 and CVE-2006-3758.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0753</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0753" source="CVE"/>
	<description>
	Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0755</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0755" source="CVE"/>
	<description>
	Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.
	</description>
 </metadata>
<!-- b3781af589fc32f2bed22cd0b798f489 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066775" comment="apache2-mod_php5 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066776" comment="php5-bcmath less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066777" comment="php5-bz2 less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066778" comment="php5-calendar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066779" comment="php5-ctype less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066780" comment="php5-curl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066781" comment="php5-dba less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066782" comment="php5-devel less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066783" comment="php5-dom less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066784" comment="php5-enchant less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066785" comment="php5-exif less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066786" comment="php5-fastcgi less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066787" comment="php5-fileinfo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066788" comment="php5-ftp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066789" comment="php5-gd less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066790" comment="php5-gettext less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066791" comment="php5-gmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066792" comment="php5-hash less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066793" comment="php5-iconv less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066794" comment="php5-imap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066795" comment="php5-intl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066796" comment="php5-json less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066797" comment="php5-ldap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066798" comment="php5-mbstring less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066799" comment="php5-mcrypt less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066800" comment="php5-mysql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066801" comment="php5-odbc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066802" comment="php5-openssl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066803" comment="php5-pcntl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066804" comment="php5-pdo less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066805" comment="php5-pear less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066806" comment="php5-pgsql less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066807" comment="php5-phar less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066808" comment="php5-posix less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066809" comment="php5-pspell less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066810" comment="php5-readline less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066811" comment="php5-shmop less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066812" comment="php5-snmp less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066813" comment="php5-soap less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066814" comment="php5-sockets less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066815" comment="php5-sqlite less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066816" comment="php5-suhosin less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066817" comment="php5-sysvmsg less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066818" comment="php5-sysvsem less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066819" comment="php5-sysvshm less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066820" comment="php5-tidy less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066821" comment="php5-tokenizer less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066822" comment="php5-wddx less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066823" comment="php5-xmlreader less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066824" comment="php5-xmlrpc less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066825" comment="php5-xmlwriter less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066826" comment="php5-xsl less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066827" comment="php5-zip less than 5.3.3-0.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066828" comment="php5-zlib less than 5.3.3-0.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0762</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0762" source="CVE"/>
	<description>
	The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
	</description>
 </metadata>
<!-- 184109d11f07ad7d7c6f3cfb4c5d67b5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068332" comment="vsftpd less than 2.2.2-3.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0778</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0778" source="CVE"/>
	<description>
	Google Chrome before 9.0.597.84 does not properly restrict drag and drop operations, which might allow remote attackers to bypass the Same Origin Policy via unspecified vectors.
	</description>
 </metadata>
<!-- 30b39a83dbb36ff2cc8542600c268763 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068428" comment="libwebkit-1_0-2-32bit less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068429" comment="libwebkit-1_0-2 less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068430" comment="libwebkit-devel less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068431" comment="libwebkit-lang less than 1.2.7-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068432" comment="webkit-jsc less than 1.2.7-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0786</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0786" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2011-0788.
	</description>
 </metadata>
<!-- 818ff4344541b27b0bebd9a04ac9030c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0788</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0788" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2011-0786.
	</description>
 </metadata>
<!-- 818ff4344541b27b0bebd9a04ac9030c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0802</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0802" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.
	</description>
 </metadata>
<!-- 818ff4344541b27b0bebd9a04ac9030c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0814</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0814" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0802.
	</description>
 </metadata>
<!-- 818ff4344541b27b0bebd9a04ac9030c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0815</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0815" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to AWT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		</criteria>
	</criteria>
	<!-- 818ff4344541b27b0bebd9a04ac9030c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0817</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0817" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- 818ff4344541b27b0bebd9a04ac9030c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0822</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0822" source="CVE"/>
	<description>
	Unspecified vulnerability in the Streams, AQ &amp; Replication Mgmt component in Oracle Database Server 10.1.0.5 and 10.2.0.3, and Oracle Enterprise Manager Grid Control 10.1.0.6, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0862</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0862" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		</criteria>
	</criteria>
	<!-- 818ff4344541b27b0bebd9a04ac9030c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0863</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0863" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- 818ff4344541b27b0bebd9a04ac9030c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0864</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0864" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		</criteria>
	</criteria>
	<!-- 818ff4344541b27b0bebd9a04ac9030c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0865</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0865" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Deserialization.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		</criteria>
	</criteria>
	<!-- 818ff4344541b27b0bebd9a04ac9030c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0866</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0866" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Java Runtime Environment.
	</description>
 </metadata>
<!-- 818ff4344541b27b0bebd9a04ac9030c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0867</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0867" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		</criteria>
	</criteria>
	<!-- 818ff4344541b27b0bebd9a04ac9030c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0868</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0868" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		</criteria>
	</criteria>
	<!-- 818ff4344541b27b0bebd9a04ac9030c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0869</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0869" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 26 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to SAAJ.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		</criteria>
	</criteria>
	<!-- 818ff4344541b27b0bebd9a04ac9030c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0870</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0870" source="CVE"/>
	<description>
	Unspecified vulnerability in the Schema Management component in Oracle Database Server 10.1.0.5, 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.1, and 11.2.0.2; and Oracle Enterprise Manager Grid Control 10.1.0.6 and 10.2.0.5; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0871</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0871" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		</criteria>
	</criteria>
	<!-- 818ff4344541b27b0bebd9a04ac9030c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0872</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0872" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect availability via unknown vectors related to NIO.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b7a24b6472135a07123c0cd14d79bf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069224" comment="icedtea-web-javadoc less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069225" comment="icedtea-web less than 1.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069226" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069227" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069228" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069229" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.2-4.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069230" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.2-4.2.1"/>
		</criteria>
	</criteria>
	<!-- 818ff4344541b27b0bebd9a04ac9030c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0873</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0873" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, and 5.0 Update 29 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
<!-- 818ff4344541b27b0bebd9a04ac9030c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068764" comment="java-1_6_0-sun-alsa less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068765" comment="java-1_6_0-sun-devel less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068766" comment="java-1_6_0-sun-jdbc less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068767" comment="java-1_6_0-sun-plugin less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068768" comment="java-1_6_0-sun-src less than 1.6.0.u26-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068769" comment="java-1_6_0-sun less than 1.6.0.u26-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0904</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0904" source="CVE"/>
	<description>
	The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
	</description>
 </metadata>
<!-- d896a6edc77aa94396701cbe542e63e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068439" comment="vino-lang less than 2.28.2-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068440" comment="vino less than 2.28.2-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0905</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0905" source="CVE"/>
	<description>
	The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
	</description>
 </metadata>
<!-- d896a6edc77aa94396701cbe542e63e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068439" comment="vino-lang less than 2.28.2-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068440" comment="vino less than 2.28.2-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0989</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0989" source="CVE"/>
	<description>
	The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cause a denial of service (plugin crash) or corrupt the internal state of the security manager, via a crafted media file, as demonstrated by modifying a C# struct.
	</description>
 </metadata>
<!-- 91b363b34cee2ce2b5bd516c1e4f8dbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067032" comment="libmoon-devel less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067033" comment="libmoon0 less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067034" comment="moonlight-desktop-devel less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067035" comment="moonlight-desktop less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067036" comment="moonlight-plugin less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067037" comment="moonlight-tools less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067038" comment="moonlight-web-devel less than 2.4.1-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0990</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0990" source="CVE"/>
	<description>
	Race condition in the FastCopy optimization in the Array.Copy method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to trigger a buffer overflow and modify internal data structures, and cause a denial of service (plugin crash) or corrupt the internal state of the security manager, via a crafted media file in which a thread makes a change after a type check but before a copy action.
	</description>
 </metadata>
<!-- 91b363b34cee2ce2b5bd516c1e4f8dbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067032" comment="libmoon-devel less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067033" comment="libmoon0 less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067034" comment="moonlight-desktop-devel less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067035" comment="moonlight-desktop less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067036" comment="moonlight-plugin less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067037" comment="moonlight-tools less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067038" comment="moonlight-web-devel less than 2.4.1-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0991</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0991" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to finalizing and then resurrecting a DynamicMethod instance.
	</description>
 </metadata>
<!-- 91b363b34cee2ce2b5bd516c1e4f8dbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067032" comment="libmoon-devel less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067033" comment="libmoon0 less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067034" comment="moonlight-desktop-devel less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067035" comment="moonlight-desktop less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067036" comment="moonlight-plugin less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067037" comment="moonlight-tools less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067038" comment="moonlight-web-devel less than 2.4.1-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0992</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0992" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to cause a denial of service (plugin crash) or obtain sensitive information via vectors related to member data in a resurrected MonoThread instance.
	</description>
 </metadata>
<!-- 91b363b34cee2ce2b5bd516c1e4f8dbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067032" comment="libmoon-devel less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067033" comment="libmoon0 less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067034" comment="moonlight-desktop-devel less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067035" comment="moonlight-desktop less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067036" comment="moonlight-plugin less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067037" comment="moonlight-tools less than 2.4.1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067038" comment="moonlight-web-devel less than 2.4.1-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0996</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0996" source="CVE"/>
	<description>
	dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.
	</description>
 </metadata>
<!-- 0fb1e5d8347d7b70ba9b973b4ddab59a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067815" comment="dhcpcd less than 3.2.3-61.66.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0997</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-0997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997" source="CVE"/>
	<description>
	dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a2a083e4666e86e24dc663c364c5bc33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067259" comment="dhcpcd less than 3.2.3-61.64.1"/>
	</criteria>
	<!-- e9fef1e2654d61da2a2d71bc5080cda5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067039" comment="dhcp-client less than 4.1.2.ESV.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067040" comment="dhcp-devel less than 4.1.2.ESV.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067041" comment="dhcp-doc less than 4.1.2.ESV.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067042" comment="dhcp-relay less than 4.1.2.ESV.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067043" comment="dhcp-server less than 4.1.2.ESV.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067044" comment="dhcp less than 4.1.2.ESV.1-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1000</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1000" source="CVE"/>
	<description>
	jingle-factory.c in Telepathy Gabble 0.11 before 0.11.7, 0.10 before 0.10.5, and 0.8 before 0.8.15 allows remote attackers to sniff audio and video calls via a crafted google:jingleinfo stanza that specifies an alternate server for streamed media.
	</description>
 </metadata>
<!-- c5a5662d3a662205fd610bc206306876 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066969" comment="telepathy-gabble-doc less than 0.9.11-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066970" comment="telepathy-gabble less than 0.9.11-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1002</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1002" source="CVE"/>
	<description>
	avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
	</description>
 </metadata>
<!-- 2b52efa9623c9b7b01a51b23a70a97fd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065934" comment="avahi-compat-howl-devel less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065935" comment="avahi-compat-mDNSResponder-devel less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065936" comment="avahi-lang less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065937" comment="avahi-utils less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065938" comment="avahi less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065939" comment="libavahi-client3-32bit less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065940" comment="libavahi-client3 less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065941" comment="libavahi-common3-32bit less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065942" comment="libavahi-common3 less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065943" comment="libavahi-core6 less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065944" comment="libavahi-devel less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065945" comment="libdns_sd-32bit less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065946" comment="libdns_sd less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065947" comment="libhowl0 less than 0.6.25-15.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065948" comment="python-avahi less than 0.6.25-15.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1003</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1003" source="CVE"/>
	<description>
	Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- c6adc20d1a4415d4e7e42f1c39acb978 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066416" comment="clamav-db less than 0.97-5.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066417" comment="clamav less than 0.97-5.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1004</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1004" source="CVE"/>
	<description>
	The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
	</description>
 </metadata>
<!-- f055e48d182b6f7f608cb8ff6aeb2fde -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068621" comment="ruby-devel less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068622" comment="ruby-doc-html less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068623" comment="ruby-doc-ri less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068624" comment="ruby-examples less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068625" comment="ruby-test-suite less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068626" comment="ruby-tk less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068627" comment="ruby less than 1.8.7.p249-8.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1005</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1005" source="CVE"/>
	<description>
	The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
	</description>
 </metadata>
<!-- f055e48d182b6f7f608cb8ff6aeb2fde -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068621" comment="ruby-devel less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068622" comment="ruby-doc-html less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068623" comment="ruby-doc-ri less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068624" comment="ruby-examples less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068625" comment="ruby-test-suite less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068626" comment="ruby-tk less than 1.8.7.p249-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068627" comment="ruby less than 1.8.7.p249-8.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1006</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1006" source="CVE"/>
	<description>
	Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application.  NOTE: it is not clear whether this issue crosses privilege boundaries.
	</description>
 </metadata>
<!-- 8c390bdc26a1e65a905a05fe7b953842 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067045" comment="libcgroup-devel less than 0.36.2-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067046" comment="libcgroup1-32bit less than 0.36.2-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067047" comment="libcgroup1 less than 0.36.2-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1010</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1010" source="CVE"/>
	<description>
	Buffer overflow in the mac_partition function in fs/partitions/mac.c in the Linux kernel before 2.6.37.2 allows local users to cause a denial of service (panic) or possibly have unspecified other impact via a malformed Mac OS partition table.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1012</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1012" source="CVE"/>
	<description>
	The ldm_parse_vmdb function in fs/partitions/ldm.c in the Linux kernel before 2.6.38-rc6-git6 does not validate the VBLK size value in the VMDB structure in an LDM partition table, which allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted partition table.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1013</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1013" source="CVE"/>
	<description>
	Integer signedness error in the drm_modeset_ctl function in (1) drivers/gpu/drm/drm_irq.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.38 and (2) sys/dev/pci/drm/drm_irq.c in the kernel in OpenBSD before 4.9 allows local users to trigger out-of-bounds write operations, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via a crafted num_crtcs (aka vb_num) structure member in an ioctl argument.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1016</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1016" source="CVE"/>
	<description>
	The Radeon GPU drivers in the Linux kernel before 2.6.38-rc5 do not properly validate data related to the AA resolve registers, which allows local users to write to arbitrary memory locations associated with (1) Video RAM (aka VRAM) or (2) the Graphics Translation Table (GTT) via crafted values.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1017</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1017" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel 2.6.37.2 and earlier might allow local users to gain privileges or obtain sensitive information via a crafted LDM partition table.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1018</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1018" source="CVE"/>
	<description>
	logwatch.pl in Logwatch 7.3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server.
	</description>
 </metadata>
<!-- 3870a0164d7d50641b014ef8dd166377 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066627" comment="logwatch less than 7.3.6-73.5.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1020</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1020" source="CVE"/>
	<description>
	The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1022</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1022" source="CVE"/>
	<description>
	The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.
	</description>
 </metadata>
<!-- 8c390bdc26a1e65a905a05fe7b953842 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067045" comment="libcgroup-devel less than 0.36.2-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067046" comment="libcgroup1-32bit less than 0.36.2-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067047" comment="libcgroup1 less than 0.36.2-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1024</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1024" source="CVE"/>
	<description>
	chain.c in back-ldap in OpenLDAP 2.4.x before 2.4.24, when a master-slave configuration with a chain overlay and ppolicy_forward_updates (aka authentication-failure forwarding) is used, allows remote authenticated users to bypass external-program authentication by sending an invalid password to a slave server.
	</description>
 </metadata>
<!-- 46731df57afec27b0333a3a544c844dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067749" comment="openldap2-back-meta less than 2.4.21-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067750" comment="openldap2-back-perl less than 2.4.21-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067751" comment="openldap2 less than 2.4.21-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1081</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1081" source="CVE"/>
	<description>
	modrdn.c in slapd in OpenLDAP 2.4.x before 2.4.24 allows remote attackers to cause a denial of service (daemon crash) via a relative Distinguished Name (DN) modification request (aka MODRDN operation) that contains an empty value for the OldDN field.
	</description>
 </metadata>
<!-- 46731df57afec27b0333a3a544c844dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067749" comment="openldap2-back-meta less than 2.4.21-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067750" comment="openldap2-back-perl less than 2.4.21-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067751" comment="openldap2 less than 2.4.21-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1082</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1082" source="CVE"/>
	<description>
	fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1089</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1089" source="CVE"/>
	<description>
	The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296.
	</description>
 </metadata>
<!-- 2f263dbb176940ce0d10683a2d846a16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070251" comment="ncpfs-32bit less than 2.2.6-166.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070252" comment="ncpfs-devel less than 2.2.6-166.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070253" comment="ncpfs less than 2.2.6-166.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1090</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1090" source="CVE"/>
	<description>
	The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allows local users to cause a denial of service (panic) via a crafted attempt to set an ACL.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1091</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091" source="CVE"/>
	<description>
	libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.
	</description>
 </metadata>
<!-- 56cdbc54c3179f1f38e10deb40f86ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072429" comment="finch-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072430" comment="finch less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072431" comment="libpurple-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072432" comment="libpurple-lang less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072433" comment="libpurple-meanwhile less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072434" comment="libpurple-mono less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072435" comment="libpurple-tcl less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072436" comment="libpurple less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072437" comment="pidgin-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072438" comment="pidgin less than 2.7.9-1.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1092</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1092" source="CVE"/>
	<description>
	Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
	</description>
 </metadata>
<!-- 37c8ea0c799c88fd6f13a46be975221c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068862" comment="apache2-mod_php5 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068863" comment="php5-bcmath less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068864" comment="php5-bz2 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068865" comment="php5-calendar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068866" comment="php5-ctype less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068867" comment="php5-curl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068868" comment="php5-dba less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068869" comment="php5-devel less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068870" comment="php5-dom less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068871" comment="php5-enchant less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068872" comment="php5-exif less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068873" comment="php5-fastcgi less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068874" comment="php5-fileinfo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068875" comment="php5-ftp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068876" comment="php5-gd less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068877" comment="php5-gettext less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068878" comment="php5-gmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068879" comment="php5-hash less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068880" comment="php5-iconv less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068881" comment="php5-imap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068882" comment="php5-intl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068883" comment="php5-json less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068884" comment="php5-ldap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068885" comment="php5-mbstring less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068886" comment="php5-mcrypt less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068887" comment="php5-mysql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068888" comment="php5-odbc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068889" comment="php5-openssl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068890" comment="php5-pcntl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068891" comment="php5-pdo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068892" comment="php5-pear less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068893" comment="php5-pgsql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068894" comment="php5-phar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068895" comment="php5-posix less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068896" comment="php5-pspell less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068897" comment="php5-readline less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068898" comment="php5-shmop less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068899" comment="php5-snmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068900" comment="php5-soap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068901" comment="php5-sockets less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068902" comment="php5-sqlite less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068903" comment="php5-suhosin less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068904" comment="php5-sysvmsg less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068905" comment="php5-sysvsem less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068906" comment="php5-sysvshm less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068907" comment="php5-tidy less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068908" comment="php5-tokenizer less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068909" comment="php5-wddx less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068910" comment="php5-xmlreader less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068911" comment="php5-xmlrpc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068912" comment="php5-xmlwriter less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068913" comment="php5-xsl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068914" comment="php5-zip less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068915" comment="php5-zlib less than 5.3.3-0.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1094</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1094" source="CVE"/>
	<description>
	kio/kio/tcpslavebase.cpp in KDE KSSL in kdelibs before 4.6.1 does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a certificate issued by a legitimate Certification Authority for an IP address, a different vulnerability than CVE-2009-2702.
	</description>
 </metadata>
<!-- 9271581e6f273a200a34c5607159ac28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066851" comment="kdelibs4-branding-upstream less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066852" comment="kdelibs4-core less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066853" comment="kdelibs4-doc less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066854" comment="kdelibs4 less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066855" comment="libkde4-32bit less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066856" comment="libkde4-devel less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066857" comment="libkde4 less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066858" comment="libkdecore4-32bit less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066859" comment="libkdecore4-devel less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066860" comment="libkdecore4 less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066861" comment="libksuseinstall-devel less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066862" comment="libksuseinstall1-32bit less than 4.4.4-3.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066863" comment="libksuseinstall1 less than 4.4.4-3.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1097</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1097" source="CVE"/>
	<description>
	rsync 3.x before 3.0.8, when certain recursion, deletion, and ownership options are used, allows remote rsync servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via malformed data.
	</description>
 </metadata>
<!-- 3824cb953df18095ae5267cbf4ca950d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068333" comment="rsync less than 3.0.7-4.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1098</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1098" source="CVE"/>
	<description>
	Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
	</description>
 </metadata>
<!-- 2be20fbe6719d806168795d0d93999f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068575" comment="logrotate less than 3.7.8-7.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1138</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1138" source="CVE"/>
	<description>
	Off-by-one error in the dissect_6lowpan_iphc function in packet-6lowpan.c in Wireshark 1.4.0 through 1.4.3 on 32-bit platforms allows remote attackers to cause a denial of service (application crash) via a malformed 6LoWPAN IPv6 packet.
	</description>
 </metadata>
<!-- 4e53c769f0f974cd9fb2a8715cf909eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066971" comment="wireshark-devel less than 1.4.4-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066948" comment="wireshark less than 1.4.4-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1139</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1139" source="CVE"/>
	<description>
	wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field.
	</description>
 </metadata>
<!-- 4e53c769f0f974cd9fb2a8715cf909eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066971" comment="wireshark-devel less than 1.4.4-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066948" comment="wireshark less than 1.4.4-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1140</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1140" source="CVE"/>
	<description>
	Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.
	</description>
 </metadata>
<!-- 4e53c769f0f974cd9fb2a8715cf909eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066971" comment="wireshark-devel less than 1.4.4-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066948" comment="wireshark less than 1.4.4-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1143</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1143" source="CVE"/>
	<description>
	epan/dissectors/packet-ntlmssp.c in the NTLMSSP dissector in Wireshark before 1.4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted .pcap file.
	</description>
 </metadata>
<!-- 4e53c769f0f974cd9fb2a8715cf909eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066971" comment="wireshark-devel less than 1.4.4-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066948" comment="wireshark less than 1.4.4-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1145</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1145" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- abda37faf0be50e674366e08cff1a7c6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069043" comment="unixODBC-32bit less than 2.2.12-204.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069044" comment="unixODBC-devel-32bit less than 2.2.12-204.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069045" comment="unixODBC-devel less than 2.2.12-204.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069046" comment="unixODBC less than 2.2.12-204.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1146</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1146" source="CVE"/>
	<description>
	libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 737a748b1a1ab17def20b4b5bbcff826 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068666" comment="vm-install less than 0.4.30-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068667" comment="xen-devel less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068668" comment="xen-doc-html less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068669" comment="xen-doc-pdf less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068670" comment="xen-kmp-default less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068671" comment="xen-kmp-desktop less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068672" comment="xen-kmp-pae less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068673" comment="xen-libs less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068674" comment="xen-tools-domU less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068675" comment="xen-tools less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068676" comment="xen less than 4.0.1_21326_08-0.7.1"/>
		</criteria>
	</criteria>
	<!-- d9c571856b1f69a3c64bbbb2e223f366 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066988" comment="libvirt-client less than 0.8.1-4.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066989" comment="libvirt-devel less than 0.8.1-4.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066990" comment="libvirt-doc less than 0.8.1-4.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066991" comment="libvirt-python less than 0.8.1-4.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066992" comment="libvirt less than 0.8.1-4.6.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1148</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1148" source="CVE"/>
	<description>
	Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.
	</description>
 </metadata>
<!-- 37c8ea0c799c88fd6f13a46be975221c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068862" comment="apache2-mod_php5 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068863" comment="php5-bcmath less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068864" comment="php5-bz2 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068865" comment="php5-calendar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068866" comment="php5-ctype less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068867" comment="php5-curl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068868" comment="php5-dba less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068869" comment="php5-devel less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068870" comment="php5-dom less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068871" comment="php5-enchant less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068872" comment="php5-exif less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068873" comment="php5-fastcgi less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068874" comment="php5-fileinfo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068875" comment="php5-ftp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068876" comment="php5-gd less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068877" comment="php5-gettext less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068878" comment="php5-gmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068879" comment="php5-hash less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068880" comment="php5-iconv less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068881" comment="php5-imap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068882" comment="php5-intl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068883" comment="php5-json less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068884" comment="php5-ldap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068885" comment="php5-mbstring less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068886" comment="php5-mcrypt less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068887" comment="php5-mysql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068888" comment="php5-odbc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068889" comment="php5-openssl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068890" comment="php5-pcntl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068891" comment="php5-pdo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068892" comment="php5-pear less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068893" comment="php5-pgsql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068894" comment="php5-phar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068895" comment="php5-posix less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068896" comment="php5-pspell less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068897" comment="php5-readline less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068898" comment="php5-shmop less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068899" comment="php5-snmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068900" comment="php5-soap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068901" comment="php5-sockets less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068902" comment="php5-sqlite less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068903" comment="php5-suhosin less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068904" comment="php5-sysvmsg less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068905" comment="php5-sysvsem less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068906" comment="php5-sysvshm less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068907" comment="php5-tidy less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068908" comment="php5-tokenizer less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068909" comment="php5-wddx less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068910" comment="php5-xmlreader less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068911" comment="php5-xmlrpc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068912" comment="php5-xmlwriter less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068913" comment="php5-xsl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068914" comment="php5-zip less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068915" comment="php5-zlib less than 5.3.3-0.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1154</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1154" source="CVE"/>
	<description>
	The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
	</description>
 </metadata>
<!-- 2be20fbe6719d806168795d0d93999f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068575" comment="logrotate less than 3.7.8-7.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1155</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1155" source="CVE"/>
	<description>
	The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
	</description>
 </metadata>
<!-- 2be20fbe6719d806168795d0d93999f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068575" comment="logrotate less than 3.7.8-7.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1156</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1156" source="CVE"/>
	<description>
	feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0.1 allows remote attackers to cause a denial of service (application crash) via a malformed DOCTYPE declaration.
	</description>
 </metadata>
<!-- a1c2bff8830482988670093dc6b9a18a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067027" comment="python-feedparser less than 4.1-6.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1157</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1157" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via malformed XML comments.
	</description>
 </metadata>
<!-- a1c2bff8830482988670093dc6b9a18a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067027" comment="python-feedparser less than 4.1-6.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1158</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1158" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) 5.x before 5.0.1 allows remote attackers to inject arbitrary web script or HTML via an unexpected URI scheme, as demonstrated by a javascript: URI.
	</description>
 </metadata>
<!-- a1c2bff8830482988670093dc6b9a18a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067027" comment="python-feedparser less than 4.1-6.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1160</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1160" source="CVE"/>
	<description>
	The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1163</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1163" source="CVE"/>
	<description>
	The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1166</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1166" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 737a748b1a1ab17def20b4b5bbcff826 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068666" comment="vm-install less than 0.4.30-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068667" comment="xen-devel less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068668" comment="xen-doc-html less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068669" comment="xen-doc-pdf less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068670" comment="xen-kmp-default less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068671" comment="xen-kmp-desktop less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068672" comment="xen-kmp-pae less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068673" comment="xen-libs less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068674" comment="xen-tools-domU less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068675" comment="xen-tools less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068676" comment="xen less than 4.0.1_21326_08-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1167</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167" source="CVE"/>
	<description>
	Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.
	</description>
 </metadata>
<!-- ecaa46248db2007ccc9934afefdef3f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067965" comment="libtiff-devel-32bit less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067966" comment="libtiff-devel less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067967" comment="libtiff3-32bit less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067968" comment="libtiff3 less than 3.9.2-5.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067969" comment="tiff less than 3.9.2-5.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1168</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1168" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the KHTMLPart::htmlError function in khtml/khtml_part.cpp in Konqueror in KDE SC 4.4.0 through 4.6.1 allows remote attackers to inject arbitrary web script or HTML via the URI in a URL corresponding to an unavailable web site.
	</description>
 </metadata>
<!-- 129775a27c3f8e6ca9ecb255fb6f598a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068441" comment="kdelibs4-branding-upstream less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068442" comment="kdelibs4-core less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068443" comment="kdelibs4-doc less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068444" comment="kdelibs4 less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068445" comment="libkde4-32bit less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068446" comment="libkde4-devel less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068447" comment="libkde4 less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068448" comment="libkdecore4-32bit less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068449" comment="libkdecore4-devel less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068450" comment="libkdecore4 less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068451" comment="libksuseinstall-devel less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068452" comment="libksuseinstall1-32bit less than 4.4.4-3.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068453" comment="libksuseinstall1 less than 4.4.4-3.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1178</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1178" source="CVE"/>
	<description>
	Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PCX image that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 2450923ba6c0103e7d65e87165249a34 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068694" comment="gimp-branding-upstream less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068695" comment="gimp-devel less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068696" comment="gimp-help-browser less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068697" comment="gimp-lang less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068698" comment="gimp-module-hal less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068699" comment="gimp-plugins-python less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068700" comment="gimp less than 2.6.8-7.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1180</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1180" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1182</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1182" source="CVE"/>
	<description>
	kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1202</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1202" source="CVE"/>
	<description>
	The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 181274ab98ea436eb39c7d8325905839 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068224" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068236" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068237" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068225" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068238" comment="mozilla-xulrunner191-translations-common less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068239" comment="mozilla-xulrunner191-translations-other less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068228" comment="mozilla-xulrunner191 less than 1.9.1.19-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068240" comment="python-xpcom191 less than 1.9.1.19-0.2.1"/>
		</criteria>
	</criteria>
	<!-- 91261decc838a409e40eb3b194bfaa92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068245" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068246" comment="MozillaFirefox-translations-common less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068247" comment="MozillaFirefox-translations-other less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068230" comment="MozillaFirefox less than 3.6.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068248" comment="mozilla-js192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068249" comment="mozilla-js192 less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068250" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068251" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068252" comment="mozilla-xulrunner192-devel less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068253" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068254" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068255" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068256" comment="mozilla-xulrunner192-translations-common less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068257" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068258" comment="mozilla-xulrunner192-translations-other less than 1.9.2.17-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068259" comment="mozilla-xulrunner192 less than 1.9.2.17-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1337</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1337" source="CVE"/>
	<description>
	Opera before 11.50 allows remote attackers to cause a denial of service (disk consumption) via invalid URLs that trigger creation of error pages.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1353</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1353" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader 10.x before 10.1.1 on Windows allows local users to gain privileges via unknown vectors.
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1407</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1407" source="CVE"/>
	<description>
	The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
	</description>
 </metadata>
<!-- 1c753c345cd29a9cd0930b0dd29a81bc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068576" comment="exim less than 4.71-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068577" comment="eximon less than 4.71-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068578" comment="eximstats-html less than 4.71-4.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1464</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1464" source="CVE"/>
	<description>
	Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
	</description>
 </metadata>
<!-- 37c8ea0c799c88fd6f13a46be975221c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068862" comment="apache2-mod_php5 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068863" comment="php5-bcmath less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068864" comment="php5-bz2 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068865" comment="php5-calendar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068866" comment="php5-ctype less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068867" comment="php5-curl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068868" comment="php5-dba less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068869" comment="php5-devel less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068870" comment="php5-dom less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068871" comment="php5-enchant less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068872" comment="php5-exif less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068873" comment="php5-fastcgi less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068874" comment="php5-fileinfo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068875" comment="php5-ftp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068876" comment="php5-gd less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068877" comment="php5-gettext less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068878" comment="php5-gmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068879" comment="php5-hash less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068880" comment="php5-iconv less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068881" comment="php5-imap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068882" comment="php5-intl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068883" comment="php5-json less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068884" comment="php5-ldap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068885" comment="php5-mbstring less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068886" comment="php5-mcrypt less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068887" comment="php5-mysql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068888" comment="php5-odbc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068889" comment="php5-openssl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068890" comment="php5-pcntl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068891" comment="php5-pdo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068892" comment="php5-pear less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068893" comment="php5-pgsql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068894" comment="php5-phar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068895" comment="php5-posix less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068896" comment="php5-pspell less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068897" comment="php5-readline less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068898" comment="php5-shmop less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068899" comment="php5-snmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068900" comment="php5-soap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068901" comment="php5-sockets less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068902" comment="php5-sqlite less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068903" comment="php5-suhosin less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068904" comment="php5-sysvmsg less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068905" comment="php5-sysvsem less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068906" comment="php5-sysvshm less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068907" comment="php5-tidy less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068908" comment="php5-tokenizer less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068909" comment="php5-wddx less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068910" comment="php5-xmlreader less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068911" comment="php5-xmlrpc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068912" comment="php5-xmlwriter less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068913" comment="php5-xsl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068914" comment="php5-zip less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068915" comment="php5-zlib less than 5.3.3-0.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1467</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1467" source="CVE"/>
	<description>
	Unspecified vulnerability in the NumberFormatter::setSymbol (aka numfmt_set_symbol) function in the Intl extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument, a related issue to CVE-2010-4409.
	</description>
 </metadata>
<!-- 37c8ea0c799c88fd6f13a46be975221c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068862" comment="apache2-mod_php5 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068863" comment="php5-bcmath less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068864" comment="php5-bz2 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068865" comment="php5-calendar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068866" comment="php5-ctype less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068867" comment="php5-curl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068868" comment="php5-dba less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068869" comment="php5-devel less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068870" comment="php5-dom less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068871" comment="php5-enchant less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068872" comment="php5-exif less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068873" comment="php5-fastcgi less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068874" comment="php5-fileinfo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068875" comment="php5-ftp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068876" comment="php5-gd less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068877" comment="php5-gettext less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068878" comment="php5-gmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068879" comment="php5-hash less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068880" comment="php5-iconv less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068881" comment="php5-imap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068882" comment="php5-intl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068883" comment="php5-json less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068884" comment="php5-ldap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068885" comment="php5-mbstring less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068886" comment="php5-mcrypt less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068887" comment="php5-mysql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068888" comment="php5-odbc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068889" comment="php5-openssl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068890" comment="php5-pcntl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068891" comment="php5-pdo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068892" comment="php5-pear less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068893" comment="php5-pgsql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068894" comment="php5-phar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068895" comment="php5-posix less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068896" comment="php5-pspell less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068897" comment="php5-readline less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068898" comment="php5-shmop less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068899" comment="php5-snmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068900" comment="php5-soap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068901" comment="php5-sockets less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068902" comment="php5-sqlite less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068903" comment="php5-suhosin less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068904" comment="php5-sysvmsg less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068905" comment="php5-sysvsem less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068906" comment="php5-sysvshm less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068907" comment="php5-tidy less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068908" comment="php5-tokenizer less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068909" comment="php5-wddx less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068910" comment="php5-xmlreader less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068911" comment="php5-xmlrpc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068912" comment="php5-xmlwriter less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068913" comment="php5-xsl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068914" comment="php5-zip less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068915" comment="php5-zlib less than 5.3.3-0.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1468</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1468" source="CVE"/>
	<description>
	Multiple memory leaks in the OpenSSL extension in PHP before 5.3.6 might allow remote attackers to cause a denial of service (memory consumption) via (1) plaintext data to the openssl_encrypt function or (2) ciphertext data to the openssl_decrypt function.
	</description>
 </metadata>
<!-- 37c8ea0c799c88fd6f13a46be975221c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068862" comment="apache2-mod_php5 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068863" comment="php5-bcmath less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068864" comment="php5-bz2 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068865" comment="php5-calendar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068866" comment="php5-ctype less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068867" comment="php5-curl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068868" comment="php5-dba less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068869" comment="php5-devel less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068870" comment="php5-dom less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068871" comment="php5-enchant less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068872" comment="php5-exif less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068873" comment="php5-fastcgi less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068874" comment="php5-fileinfo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068875" comment="php5-ftp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068876" comment="php5-gd less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068877" comment="php5-gettext less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068878" comment="php5-gmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068879" comment="php5-hash less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068880" comment="php5-iconv less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068881" comment="php5-imap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068882" comment="php5-intl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068883" comment="php5-json less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068884" comment="php5-ldap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068885" comment="php5-mbstring less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068886" comment="php5-mcrypt less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068887" comment="php5-mysql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068888" comment="php5-odbc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068889" comment="php5-openssl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068890" comment="php5-pcntl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068891" comment="php5-pdo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068892" comment="php5-pear less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068893" comment="php5-pgsql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068894" comment="php5-phar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068895" comment="php5-posix less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068896" comment="php5-pspell less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068897" comment="php5-readline less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068898" comment="php5-shmop less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068899" comment="php5-snmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068900" comment="php5-soap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068901" comment="php5-sockets less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068902" comment="php5-sqlite less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068903" comment="php5-suhosin less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068904" comment="php5-sysvmsg less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068905" comment="php5-sysvsem less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068906" comment="php5-sysvshm less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068907" comment="php5-tidy less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068908" comment="php5-tokenizer less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068909" comment="php5-wddx less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068910" comment="php5-xmlreader less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068911" comment="php5-xmlrpc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068912" comment="php5-xmlwriter less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068913" comment="php5-xsl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068914" comment="php5-zip less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068915" comment="php5-zlib less than 5.3.3-0.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1469</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1469" source="CVE"/>
	<description>
	Unspecified vulnerability in the Streams component in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) by accessing an ftp:// URL during use of an HTTP proxy with the FTP wrapper.
	</description>
 </metadata>
<!-- 37c8ea0c799c88fd6f13a46be975221c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068862" comment="apache2-mod_php5 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068863" comment="php5-bcmath less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068864" comment="php5-bz2 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068865" comment="php5-calendar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068866" comment="php5-ctype less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068867" comment="php5-curl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068868" comment="php5-dba less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068869" comment="php5-devel less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068870" comment="php5-dom less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068871" comment="php5-enchant less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068872" comment="php5-exif less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068873" comment="php5-fastcgi less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068874" comment="php5-fileinfo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068875" comment="php5-ftp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068876" comment="php5-gd less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068877" comment="php5-gettext less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068878" comment="php5-gmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068879" comment="php5-hash less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068880" comment="php5-iconv less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068881" comment="php5-imap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068882" comment="php5-intl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068883" comment="php5-json less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068884" comment="php5-ldap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068885" comment="php5-mbstring less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068886" comment="php5-mcrypt less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068887" comment="php5-mysql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068888" comment="php5-odbc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068889" comment="php5-openssl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068890" comment="php5-pcntl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068891" comment="php5-pdo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068892" comment="php5-pear less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068893" comment="php5-pgsql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068894" comment="php5-phar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068895" comment="php5-posix less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068896" comment="php5-pspell less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068897" comment="php5-readline less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068898" comment="php5-shmop less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068899" comment="php5-snmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068900" comment="php5-soap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068901" comment="php5-sockets less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068902" comment="php5-sqlite less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068903" comment="php5-suhosin less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068904" comment="php5-sysvmsg less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068905" comment="php5-sysvsem less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068906" comment="php5-sysvshm less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068907" comment="php5-tidy less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068908" comment="php5-tokenizer less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068909" comment="php5-wddx less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068910" comment="php5-xmlreader less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068911" comment="php5-xmlrpc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068912" comment="php5-xmlwriter less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068913" comment="php5-xsl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068914" comment="php5-zip less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068915" comment="php5-zlib less than 5.3.3-0.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1470</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1470" source="CVE"/>
	<description>
	The Zip extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via a ziparchive stream that is not properly handled by the stream_get_contents function.
	</description>
 </metadata>
<!-- 37c8ea0c799c88fd6f13a46be975221c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068862" comment="apache2-mod_php5 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068863" comment="php5-bcmath less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068864" comment="php5-bz2 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068865" comment="php5-calendar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068866" comment="php5-ctype less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068867" comment="php5-curl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068868" comment="php5-dba less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068869" comment="php5-devel less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068870" comment="php5-dom less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068871" comment="php5-enchant less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068872" comment="php5-exif less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068873" comment="php5-fastcgi less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068874" comment="php5-fileinfo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068875" comment="php5-ftp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068876" comment="php5-gd less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068877" comment="php5-gettext less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068878" comment="php5-gmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068879" comment="php5-hash less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068880" comment="php5-iconv less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068881" comment="php5-imap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068882" comment="php5-intl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068883" comment="php5-json less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068884" comment="php5-ldap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068885" comment="php5-mbstring less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068886" comment="php5-mcrypt less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068887" comment="php5-mysql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068888" comment="php5-odbc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068889" comment="php5-openssl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068890" comment="php5-pcntl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068891" comment="php5-pdo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068892" comment="php5-pear less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068893" comment="php5-pgsql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068894" comment="php5-phar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068895" comment="php5-posix less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068896" comment="php5-pspell less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068897" comment="php5-readline less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068898" comment="php5-shmop less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068899" comment="php5-snmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068900" comment="php5-soap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068901" comment="php5-sockets less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068902" comment="php5-sqlite less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068903" comment="php5-suhosin less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068904" comment="php5-sysvmsg less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068905" comment="php5-sysvsem less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068906" comment="php5-sysvshm less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068907" comment="php5-tidy less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068908" comment="php5-tokenizer less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068909" comment="php5-wddx less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068910" comment="php5-xmlreader less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068911" comment="php5-xmlrpc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068912" comment="php5-xmlwriter less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068913" comment="php5-xsl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068914" comment="php5-zip less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068915" comment="php5-zlib less than 5.3.3-0.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1471</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1471" source="CVE"/>
	<description>
	Integer signedness error in zip_stream.c in the Zip extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (CPU consumption) via a malformed archive file that triggers errors in zip_fread function calls.
	</description>
 </metadata>
<!-- 37c8ea0c799c88fd6f13a46be975221c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068862" comment="apache2-mod_php5 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068863" comment="php5-bcmath less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068864" comment="php5-bz2 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068865" comment="php5-calendar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068866" comment="php5-ctype less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068867" comment="php5-curl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068868" comment="php5-dba less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068869" comment="php5-devel less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068870" comment="php5-dom less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068871" comment="php5-enchant less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068872" comment="php5-exif less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068873" comment="php5-fastcgi less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068874" comment="php5-fileinfo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068875" comment="php5-ftp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068876" comment="php5-gd less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068877" comment="php5-gettext less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068878" comment="php5-gmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068879" comment="php5-hash less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068880" comment="php5-iconv less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068881" comment="php5-imap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068882" comment="php5-intl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068883" comment="php5-json less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068884" comment="php5-ldap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068885" comment="php5-mbstring less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068886" comment="php5-mcrypt less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068887" comment="php5-mysql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068888" comment="php5-odbc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068889" comment="php5-openssl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068890" comment="php5-pcntl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068891" comment="php5-pdo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068892" comment="php5-pear less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068893" comment="php5-pgsql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068894" comment="php5-phar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068895" comment="php5-posix less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068896" comment="php5-pspell less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068897" comment="php5-readline less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068898" comment="php5-shmop less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068899" comment="php5-snmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068900" comment="php5-soap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068901" comment="php5-sockets less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068902" comment="php5-sqlite less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068903" comment="php5-suhosin less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068904" comment="php5-sysvmsg less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068905" comment="php5-sysvsem less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068906" comment="php5-sysvshm less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068907" comment="php5-tidy less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068908" comment="php5-tokenizer less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068909" comment="php5-wddx less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068910" comment="php5-xmlreader less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068911" comment="php5-xmlrpc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068912" comment="php5-xmlwriter less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068913" comment="php5-xsl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068914" comment="php5-zip less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068915" comment="php5-zlib less than 5.3.3-0.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1476</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1476" source="CVE"/>
	<description>
	Integer underflow in the Open Sound System (OSS) subsystem in the Linux kernel before 2.6.39 on unspecified non-x86 platforms allows local users to cause a denial of service (memory corruption) by leveraging write access to /dev/sequencer.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1477</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1477" source="CVE"/>
	<description>
	Multiple array index errors in sound/oss/opl3.c in the Linux kernel before 2.6.39 allow local users to cause a denial of service (heap memory corruption) or possibly gain privileges by leveraging write access to /dev/sequencer.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1478</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1478" source="CVE"/>
	<description>
	The napi_reuse_skb function in net/core/dev.c in the Generic Receive Offload (GRO) implementation in the Linux kernel before 2.6.38 does not reset the values of certain structure members, which might allow remote attackers to cause a denial of service (NULL pointer dereference) via a malformed VLAN frame.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2bed7091aa699baa46f25b381a1bed8f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		</criteria>
	</criteria>
	<!-- f01566cf081c054148f1ca4c3bd88ebf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1479</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1479" source="CVE"/>
	<description>
	Double free vulnerability in the inotify subsystem in the Linux kernel before 2.6.39 allows local users to cause a denial of service (system crash) via vectors involving failed attempts to create files.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-4250.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1485</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1485" source="CVE"/>
	<description>
	Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
	</description>
 </metadata>
<!-- 93f7b436f7aaaf0817cdaf1f5aea09a2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068040" comment="libpolkit0-32bit less than 0.96-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068041" comment="libpolkit0 less than 0.96-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068042" comment="polkit-devel less than 0.96-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068043" comment="polkit-doc less than 0.96-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068044" comment="polkit less than 0.96-5.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1486</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1486" source="CVE"/>
	<description>
	libvirtd in libvirt before 0.9.0 does not use thread-safe error reporting, which allows remote attackers to cause a denial of service (crash) by causing multiple threads to report errors at the same time.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 737a748b1a1ab17def20b4b5bbcff826 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068666" comment="vm-install less than 0.4.30-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068667" comment="xen-devel less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068668" comment="xen-doc-html less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068669" comment="xen-doc-pdf less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068670" comment="xen-kmp-default less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068671" comment="xen-kmp-desktop less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068672" comment="xen-kmp-pae less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068673" comment="xen-libs less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068674" comment="xen-tools-domU less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068675" comment="xen-tools less than 4.0.1_21326_08-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068676" comment="xen less than 4.0.1_21326_08-0.7.1"/>
		</criteria>
	</criteria>
	<!-- d643968fe884b0ae2ec3258842594406 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067048" comment="libvirt-client less than 0.8.1-4.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067049" comment="libvirt-devel less than 0.8.1-4.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067050" comment="libvirt-doc less than 0.8.1-4.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067051" comment="libvirt-python less than 0.8.1-4.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067052" comment="libvirt less than 0.8.1-4.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1487</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1487" source="CVE"/>
	<description>
	The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
	</description>
 </metadata>
<!-- 2cf658f7441dc8449cec268519371ea0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068433" comment="perl-32bit less than 5.12.1-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068434" comment="perl-base-32bit less than 5.12.1-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068435" comment="perl-base less than 5.12.1-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068436" comment="perl-doc less than 5.12.1-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068437" comment="perl less than 5.12.1-2.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1493</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1493" source="CVE"/>
	<description>
	Array index error in the rose_parse_national function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by composing FAC_NATIONAL_DIGIS data that specifies a large number of digipeaters, and then sending this data to a ROSE socket.
	</description>
 </metadata>
<!-- f01566cf081c054148f1ca4c3bd88ebf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067970" comment="kernel-debug-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067971" comment="kernel-debug-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067972" comment="kernel-debug less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067973" comment="kernel-default-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067974" comment="kernel-default-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067975" comment="kernel-default less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067976" comment="kernel-desktop-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067977" comment="kernel-desktop-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067978" comment="kernel-desktop less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067979" comment="kernel-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067980" comment="kernel-ec2-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067981" comment="kernel-ec2-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067982" comment="kernel-ec2-extra less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067983" comment="kernel-ec2 less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067984" comment="kernel-pae-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067985" comment="kernel-pae-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067986" comment="kernel-pae less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067987" comment="kernel-source-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067988" comment="kernel-source less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067989" comment="kernel-syms less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067990" comment="kernel-trace-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067991" comment="kernel-trace-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067992" comment="kernel-trace less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067993" comment="kernel-vanilla-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067994" comment="kernel-vanilla-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067995" comment="kernel-vanilla less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067996" comment="kernel-vmi-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067997" comment="kernel-vmi-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067998" comment="kernel-vmi less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067999" comment="kernel-xen-base less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068000" comment="kernel-xen-devel less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068001" comment="kernel-xen less than 2.6.34.8-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068002" comment="preload-kmp-default less than 1.1_k2.6.34.8_0.2-19.1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068003" comment="preload-kmp-desktop less than 1.1_k2.6.34.8_0.2-19.1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1518</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1518" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Open Ticket Request System (OTRS) 2.4.x before 2.4.10 and 3.x before 3.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- 3bbf93f3c252317e27ce98c517a8ec3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068359" comment="otrs-doc less than 2.4.9-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068360" comment="otrs-itsm less than 2.1.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068361" comment="otrs less than 2.4.9-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1521</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521" source="CVE"/>
	<description>
	The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
	</description>
 </metadata>
<!-- 171693795d25077ba77fcc1ca170cc06 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068454" comment="libpython2_6-1_0-32bit less than 2.6.5-3.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068455" comment="libpython2_6-1_0 less than 2.6.5-3.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068456" comment="python-32bit less than 2.6.5-3.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068457" comment="python-base-32bit less than 2.6.5-3.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068458" comment="python-base less than 2.6.5-3.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068459" comment="python-curses less than 2.6.5-3.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068460" comment="python-demo less than 2.6.5-3.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068461" comment="python-devel less than 2.6.5-3.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068462" comment="python-gdbm less than 2.6.5-3.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068463" comment="python-idle less than 2.6.5-3.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068464" comment="python-tk less than 2.6.5-3.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068465" comment="python-xml less than 2.6.5-3.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068466" comment="python less than 2.6.5-3.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1523</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1523" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter.
	</description>
 </metadata>
<!-- 13163a34bf67fbaeb88dd41e644089e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069520" comment="nagios-devel less than 3.2.1-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069521" comment="nagios-www less than 3.2.1-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069522" comment="nagios less than 3.2.1-4.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1526</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1526" source="CVE"/>
	<description>
	ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 52987cd5a9f6916dfa806c1c0b2327b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072352" comment="krb5-appl-clients less than 1.0-4.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072353" comment="krb5-appl-servers less than 1.0-4.5.1"/>
		</criteria>
	</criteria>
	<!-- 74772a873ea725240d9cf158c713b16f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071563" comment="krb5-32bit less than 1.8.1-5.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071564" comment="krb5-appl-clients less than 1.0-4.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071565" comment="krb5-appl-servers less than 1.0-4.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071566" comment="krb5-client less than 1.8.1-5.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071567" comment="krb5-devel-32bit less than 1.8.1-5.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071568" comment="krb5-devel less than 1.8.1-5.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071569" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071570" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071571" comment="krb5-server less than 1.8.1-5.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071572" comment="krb5 less than 1.8.1-5.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1528</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528" source="CVE"/>
	<description>
	The krb5_ldap_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors, related to the locked_check_p function.  NOTE: the Berkeley DB vector is covered by CVE-2011-4151.
	</description>
 </metadata>
<!-- 74772a873ea725240d9cf158c713b16f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071563" comment="krb5-32bit less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071564" comment="krb5-appl-clients less than 1.0-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071565" comment="krb5-appl-servers less than 1.0-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071566" comment="krb5-client less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071567" comment="krb5-devel-32bit less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071568" comment="krb5-devel less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071569" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071570" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071571" comment="krb5-server less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071572" comment="krb5 less than 1.8.1-5.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1529</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529" source="CVE"/>
	<description>
	The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.
	</description>
 </metadata>
<!-- 74772a873ea725240d9cf158c713b16f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071563" comment="krb5-32bit less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071564" comment="krb5-appl-clients less than 1.0-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071565" comment="krb5-appl-servers less than 1.0-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071566" comment="krb5-client less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071567" comment="krb5-devel-32bit less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071568" comment="krb5-devel less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071569" comment="krb5-plugin-kdb-ldap less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071570" comment="krb5-plugin-preauth-pkinit less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071571" comment="krb5-server less than 1.8.1-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071572" comment="krb5 less than 1.8.1-5.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1574</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1574" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ReadS3M method in load_s3m.cpp in libmodplug before 0.8.8.2 allows remote attackers to execute arbitrary code via a crafted S3M file.
	</description>
 </metadata>
<!-- 410ac699d1d301dbc997f23677f5cf85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067268" comment="libmodplug-devel less than 0.8.7-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067269" comment="libmodplug0-32bit less than 0.8.7-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067270" comment="libmodplug0 less than 0.8.7-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1575</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1575" source="CVE"/>
	<description>
	The STARTTLS implementation in ftp_parser.c in Pure-FTPd before 1.0.30 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted FTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
	</description>
 </metadata>
<!-- 6ce89e5d50d91911ef32744eb80138d9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068438" comment="pure-ftpd less than 1.0.29-2.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1576</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1576" source="CVE"/>
	<description>
	The Generic Receive Offload (GRO) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux 5 and 2.6.32 on Red Hat Enterprise Linux 6, as used in Red Hat Enterprise Virtualization (RHEV) Hypervisor and other products, allows remote attackers to cause a denial of service via crafted VLAN packets that are processed by the napi_reuse_skb function, leading to (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1577</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577" source="CVE"/>
	<description>
	Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 49903363274aef98b63c36d4cc181bfe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		</criteria>
	</criteria>
	<!-- ebc337cc8b33a14657744237f336f151 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071733" comment="kernel-debug-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071734" comment="kernel-debug-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071735" comment="kernel-debug less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071736" comment="kernel-default-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071737" comment="kernel-default-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071738" comment="kernel-default less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071739" comment="kernel-desktop-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071740" comment="kernel-desktop-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071741" comment="kernel-desktop less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071742" comment="kernel-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071743" comment="kernel-ec2-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071744" comment="kernel-ec2-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071745" comment="kernel-ec2-extra less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071746" comment="kernel-ec2 less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071747" comment="kernel-pae-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071748" comment="kernel-pae-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071749" comment="kernel-pae less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071750" comment="kernel-source-vanilla less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071751" comment="kernel-source less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071752" comment="kernel-syms less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071753" comment="kernel-trace-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071754" comment="kernel-trace-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071755" comment="kernel-trace less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071756" comment="kernel-vanilla-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071757" comment="kernel-vanilla-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071758" comment="kernel-vanilla less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071759" comment="kernel-vmi-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071760" comment="kernel-vmi-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071761" comment="kernel-vmi less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071762" comment="kernel-xen-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071763" comment="kernel-xen-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071764" comment="kernel-xen less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071765" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.4-19.1.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071766" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.4-19.1.30"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1583</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1583" source="CVE"/>
	<description>
	Multiple integer overflows in tools/libxc/xc_dom_bzimageloader.c in Xen 3.2, 3.3, 4.0, and 4.1 allow local users to cause a denial of service and possibly execute arbitrary code via a crafted paravirtualised guest kernel image that triggers (1) a buffer overflow during a decompression loop or (2) an out-of-bounds read in the loader involving unspecified length fields.
	</description>
 </metadata>
<!-- 737a748b1a1ab17def20b4b5bbcff826 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068666" comment="vm-install less than 0.4.30-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068667" comment="xen-devel less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068668" comment="xen-doc-html less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068669" comment="xen-doc-pdf less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068670" comment="xen-kmp-default less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068671" comment="xen-kmp-desktop less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068672" comment="xen-kmp-pae less than 4.0.1_21326_08_k2.6.34.8_0.2-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068673" comment="xen-libs less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068674" comment="xen-tools-domU less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068675" comment="xen-tools less than 4.0.1_21326_08-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068676" comment="xen less than 4.0.1_21326_08-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1585</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1585" source="CVE"/>
	<description>
	The cifs_find_smb_ses function in fs/cifs/connect.c in the Linux kernel before 2.6.36 does not properly determine the associations between users and sessions, which allows local users to bypass CIFS share authentication by leveraging a mount of a share by a different user.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1590</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1590" source="CVE"/>
	<description>
	The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
	</description>
 </metadata>
<!-- 455ede84cb7cf61a907f0e553b9d4222 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068720" comment="wireshark-devel less than 1.4.4-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068718" comment="wireshark less than 1.4.4-0.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1591</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1591" source="CVE"/>
	<description>
	Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
	</description>
 </metadata>
<!-- 455ede84cb7cf61a907f0e553b9d4222 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068720" comment="wireshark-devel less than 1.4.4-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068718" comment="wireshark less than 1.4.4-0.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1592</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1592" source="CVE"/>
	<description>
	The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
	</description>
 </metadata>
<!-- 455ede84cb7cf61a907f0e553b9d4222 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068720" comment="wireshark-devel less than 1.4.4-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068718" comment="wireshark less than 1.4.4-0.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1593</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1593" source="CVE"/>
	<description>
	Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1595</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1595" source="CVE"/>
	<description>
	Directory traversal vulnerability in the disk_create function in disk.c in rdesktop before 1.7.0, when disk redirection is enabled, allows remote RDP servers to read or overwrite arbitrary files via a .. (dot dot) in a pathname.
	</description>
 </metadata>
<!-- 32e34ac457960c07b371eb7ae2043fdf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068546" comment="rdesktop less than 1.6.0-43.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1679</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1679" source="CVE"/>
	<description>
	ncpfs 2.2.6 and earlier attempts to use (1) ncpmount to append to the /etc/mtab file and (2) ncpumount to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
	</description>
 </metadata>
<!-- 2f263dbb176940ce0d10683a2d846a16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070251" comment="ncpfs-32bit less than 2.2.6-166.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070252" comment="ncpfs-devel less than 2.2.6-166.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070253" comment="ncpfs less than 2.2.6-166.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1680</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1680" source="CVE"/>
	<description>
	ncpmount in ncpfs 2.2.6 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.
	</description>
 </metadata>
<!-- 2f263dbb176940ce0d10683a2d846a16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070251" comment="ncpfs-32bit less than 2.2.6-166.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070252" comment="ncpfs-devel less than 2.2.6-166.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070253" comment="ncpfs less than 2.2.6-166.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1681</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1681" source="CVE"/>
	<description>
	vmware-hgfsmounter in VMware Open Virtual Machine Tools (aka open-vm-tools) 8.4.2-261024 and earlier attempts to append to the /etc/mtab file without first checking whether resource limits would interfere, which allows local users to trigger corruption of this file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
	</description>
 </metadata>
<!-- c4e28e547afb00402ad9f9c0f5fc2ae0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068745" comment="libvmtools-devel less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068746" comment="libvmtools0 less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068747" comment="open-vm-tools-gui less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068748" comment="open-vm-tools less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068749" comment="vmware-guest-kmp-default less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068750" comment="vmware-guest-kmp-desktop less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068751" comment="vmware-guest-kmp-pae less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1720</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1720" source="CVE"/>
	<description>
	The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
	</description>
 </metadata>
<!-- b36ccdf79b4de96f1d83521a6f0cc481 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068370" comment="postfix-devel less than 2.7.1-2.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068371" comment="postfix-doc less than 2.7.1-2.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068372" comment="postfix-mysql less than 2.7.1-2.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068373" comment="postfix-postgresql less than 2.7.1-2.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068374" comment="postfix less than 2.7.1-2.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1750</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1750" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the virtio-blk driver (hw/virtio-blk.c) in qemu-kvm 0.14.0 allow local guest users to cause a denial of service (guest crash) and possibly gain privileges via a (1) write request to the virtio_blk_handle_write function or (2) read request to the virtio_blk_handle_read function that is not properly aligned.
	</description>
 </metadata>
<!-- a32451ea315607031b17b0568c6e7bde -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068510" comment="kvm less than 0.12.5-1.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1751</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1751" source="CVE"/>
	<description>
	The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."
	</description>
 </metadata>
<!-- a32451ea315607031b17b0568c6e7bde -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068510" comment="kvm less than 0.12.5-1.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1752</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1752" source="CVE"/>
	<description>
	The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.
	</description>
 </metadata>
<!-- 3060c0b0ae3a735f69def8adbf722b82 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069056" comment="libsvn_auth_gnome_keyring-1-0 less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069057" comment="libsvn_auth_kwallet-1-0 less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069058" comment="subversion-devel less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069059" comment="subversion-perl less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069060" comment="subversion-python less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069061" comment="subversion-ruby less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069062" comment="subversion-server less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069063" comment="subversion-tools less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069064" comment="subversion less than 1.6.9-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1761</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1761" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5879da1a9d0938afb02361f57e0c32fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070029" comment="libmodplug-devel less than 0.8.8.4-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070030" comment="libmodplug0-32bit less than 0.8.8.4-2.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070031" comment="libmodplug0 less than 0.8.8.4-2.2.1"/>
		</criteria>
	</criteria>
	<!-- 97c115667bf784eb2a969281a338f56a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068628" comment="libmodplug-devel less than 0.8.8.3-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068629" comment="libmodplug0-32bit less than 0.8.8.3-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068630" comment="libmodplug0 less than 0.8.8.3-2.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1764</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1764" source="CVE"/>
	<description>
	Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
	</description>
 </metadata>
<!-- 953b34df70584f53ab237ff9af03e270 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068350" comment="exim less than 4.71-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068351" comment="eximon less than 4.71-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068352" comment="eximstats-html less than 4.71-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1770</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1770" source="CVE"/>
	<description>
	Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1776</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1776" source="CVE"/>
	<description>
	The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.
	</description>
 </metadata>
<!-- ebc337cc8b33a14657744237f336f151 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071733" comment="kernel-debug-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071734" comment="kernel-debug-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071735" comment="kernel-debug less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071736" comment="kernel-default-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071737" comment="kernel-default-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071738" comment="kernel-default less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071739" comment="kernel-desktop-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071740" comment="kernel-desktop-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071741" comment="kernel-desktop less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071742" comment="kernel-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071743" comment="kernel-ec2-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071744" comment="kernel-ec2-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071745" comment="kernel-ec2-extra less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071746" comment="kernel-ec2 less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071747" comment="kernel-pae-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071748" comment="kernel-pae-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071749" comment="kernel-pae less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071750" comment="kernel-source-vanilla less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071751" comment="kernel-source less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071752" comment="kernel-syms less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071753" comment="kernel-trace-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071754" comment="kernel-trace-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071755" comment="kernel-trace less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071756" comment="kernel-vanilla-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071757" comment="kernel-vanilla-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071758" comment="kernel-vanilla less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071759" comment="kernel-vmi-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071760" comment="kernel-vmi-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071761" comment="kernel-vmi less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071762" comment="kernel-xen-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071763" comment="kernel-xen-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071764" comment="kernel-xen less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071765" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.4-19.1.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071766" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.4-19.1.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1782</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1782" source="CVE"/>
	<description>
	Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image.  NOTE: some of these details are obtained from third party information.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4543.
	</description>
 </metadata>
<!-- 2450923ba6c0103e7d65e87165249a34 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068694" comment="gimp-branding-upstream less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068695" comment="gimp-devel less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068696" comment="gimp-help-browser less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068697" comment="gimp-lang less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068698" comment="gimp-module-hal less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068699" comment="gimp-plugins-python less than 2.6.8-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068700" comment="gimp less than 2.6.8-7.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1783</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1783" source="CVE"/>
	<description>
	The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
	</description>
 </metadata>
<!-- 3060c0b0ae3a735f69def8adbf722b82 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069056" comment="libsvn_auth_gnome_keyring-1-0 less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069057" comment="libsvn_auth_kwallet-1-0 less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069058" comment="subversion-devel less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069059" comment="subversion-perl less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069060" comment="subversion-python less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069061" comment="subversion-ruby less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069062" comment="subversion-server less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069063" comment="subversion-tools less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069064" comment="subversion less than 1.6.9-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1787</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1787" source="CVE"/>
	<description>
	Race condition in mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 though 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to gain privileges on the guest OS by mounting a filesystem on top of an arbitrary directory.
	</description>
 </metadata>
<!-- c4e28e547afb00402ad9f9c0f5fc2ae0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068745" comment="libvmtools-devel less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068746" comment="libvmtools0 less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068747" comment="open-vm-tools-gui less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068748" comment="open-vm-tools less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068749" comment="vmware-guest-kmp-default less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068750" comment="vmware-guest-kmp-desktop less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068751" comment="vmware-guest-kmp-pae less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1831</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1831" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- a59170e278c9f5b63daa0f23925fb690 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069771" comment="ecryptfs-utils-32bit less than 83-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069772" comment="ecryptfs-utils less than 83-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1832</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1832" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- a59170e278c9f5b63daa0f23925fb690 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069771" comment="ecryptfs-utils-32bit less than 83-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069772" comment="ecryptfs-utils less than 83-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1833</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833" source="CVE"/>
	<description>
	Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a59170e278c9f5b63daa0f23925fb690 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069771" comment="ecryptfs-utils-32bit less than 83-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069772" comment="ecryptfs-utils less than 83-3.3.1"/>
		</criteria>
	</criteria>
	<!-- ebc337cc8b33a14657744237f336f151 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071733" comment="kernel-debug-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071734" comment="kernel-debug-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071735" comment="kernel-debug less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071736" comment="kernel-default-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071737" comment="kernel-default-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071738" comment="kernel-default less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071739" comment="kernel-desktop-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071740" comment="kernel-desktop-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071741" comment="kernel-desktop less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071742" comment="kernel-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071743" comment="kernel-ec2-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071744" comment="kernel-ec2-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071745" comment="kernel-ec2-extra less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071746" comment="kernel-ec2 less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071747" comment="kernel-pae-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071748" comment="kernel-pae-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071749" comment="kernel-pae less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071750" comment="kernel-source-vanilla less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071751" comment="kernel-source less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071752" comment="kernel-syms less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071753" comment="kernel-trace-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071754" comment="kernel-trace-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071755" comment="kernel-trace less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071756" comment="kernel-vanilla-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071757" comment="kernel-vanilla-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071758" comment="kernel-vanilla less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071759" comment="kernel-vmi-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071760" comment="kernel-vmi-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071761" comment="kernel-vmi less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071762" comment="kernel-xen-base less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071763" comment="kernel-xen-devel less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071764" comment="kernel-xen less than 2.6.34.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071765" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.4-19.1.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071766" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.4-19.1.30"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1834</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1834" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- a59170e278c9f5b63daa0f23925fb690 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069771" comment="ecryptfs-utils-32bit less than 83-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069772" comment="ecryptfs-utils less than 83-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1835</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1835" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- a59170e278c9f5b63daa0f23925fb690 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069771" comment="ecryptfs-utils-32bit less than 83-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069772" comment="ecryptfs-utils less than 83-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1837</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1837" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- a59170e278c9f5b63daa0f23925fb690 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069771" comment="ecryptfs-utils-32bit less than 83-3.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069772" comment="ecryptfs-utils less than 83-3.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1898</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898" source="CVE"/>
	<description>
	Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
	</description>
 </metadata>
<!-- 19a70839efaa40aedf32c3044e0a6a50 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070032" comment="vm-install less than 0.4.31-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070033" comment="xen-devel less than 4.0.2_21511_02-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070034" comment="xen-doc-html less than 4.0.2_21511_02-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070035" comment="xen-doc-pdf less than 4.0.2_21511_02-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070036" comment="xen-kmp-default less than 4.0.2_21511_02_k2.6.34.10_0.2-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070037" comment="xen-kmp-desktop less than 4.0.2_21511_02_k2.6.34.10_0.2-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070038" comment="xen-kmp-pae less than 4.0.2_21511_02_k2.6.34.10_0.2-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070039" comment="xen-libs less than 4.0.2_21511_02-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070040" comment="xen-tools-domU less than 4.0.2_21511_02-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070041" comment="xen-tools less than 4.0.2_21511_02-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070042" comment="xen less than 4.0.2_21511_02-0.5.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1910</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910" source="CVE"/>
	<description>
	Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.
	</description>
 </metadata>
<!-- b7a0af84d16e7b147e02ebe810c9dcf8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068721" comment="bind-chrootenv less than 9.7.3P1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068722" comment="bind-devel less than 9.7.3P1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068723" comment="bind-doc less than 9.7.3P1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068724" comment="bind-libs-32bit less than 9.7.3P1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068725" comment="bind-libs less than 9.7.3P1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068726" comment="bind-utils less than 9.7.3P1-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068727" comment="bind less than 9.7.3P1-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1921</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1921" source="CVE"/>
	<description>
	The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.
	</description>
 </metadata>
<!-- 3060c0b0ae3a735f69def8adbf722b82 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069056" comment="libsvn_auth_gnome_keyring-1-0 less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069057" comment="libsvn_auth_kwallet-1-0 less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069058" comment="subversion-devel less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069059" comment="subversion-perl less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069060" comment="subversion-python less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069061" comment="subversion-ruby less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069062" comment="subversion-server less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069063" comment="subversion-tools less than 1.6.9-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069064" comment="subversion less than 1.6.9-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1926</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1926" source="CVE"/>
	<description>
	The STARTTLS implementation in Cyrus IMAP Server before 2.4.7 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
	</description>
 </metadata>
<!-- d5aec8bc46cb53886e58177a21847973 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069450" comment="cyrus-imapd-devel less than 2.3.16-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069451" comment="cyrus-imapd less than 2.3.16-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069452" comment="perl-Cyrus-IMAP less than 2.3.16-8.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069453" comment="perl-Cyrus-SIEVE-managesieve less than 2.3.16-8.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1928</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1928" source="CVE"/>
	<description>
	The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used.  NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
	</description>
 </metadata>
<!-- 79f2b3c814fddec22bbc71334e59bc37 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069596" comment="apache2-devel less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069597" comment="apache2-doc less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069598" comment="apache2-example-certificates less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069599" comment="apache2-example-pages less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069600" comment="apache2-itk less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069601" comment="apache2-prefork less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069602" comment="apache2-utils less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069603" comment="apache2-worker less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069604" comment="apache2 less than 2.2.15-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069605" comment="libapr-util1-dbd-mysql less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069606" comment="libapr-util1-dbd-pgsql less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069607" comment="libapr-util1-dbd-sqlite3 less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069608" comment="libapr-util1-devel less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069609" comment="libapr-util1 less than 1.3.9-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069610" comment="libapr1-devel less than 1.3.8-8.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069611" comment="libapr1 less than 1.3.8-8.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1929</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1929" source="CVE"/>
	<description>
	lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
	</description>
 </metadata>
<!-- 80cdf13c34a49451e6a6bcf6d16a658b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068579" comment="dovecot12-backend-mysql less than 1.2.17-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068580" comment="dovecot12-backend-pgsql less than 1.2.17-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068581" comment="dovecot12-backend-sqlite less than 1.2.17-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068582" comment="dovecot12-devel less than 1.2.17-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068583" comment="dovecot12-fts-lucene less than 1.2.17-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068584" comment="dovecot12-fts-solr less than 1.2.17-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068585" comment="dovecot12 less than 1.2.17-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1938</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1938" source="CVE"/>
	<description>
	Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
	</description>
 </metadata>
<!-- 37c8ea0c799c88fd6f13a46be975221c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068862" comment="apache2-mod_php5 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068863" comment="php5-bcmath less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068864" comment="php5-bz2 less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068865" comment="php5-calendar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068866" comment="php5-ctype less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068867" comment="php5-curl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068868" comment="php5-dba less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068869" comment="php5-devel less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068870" comment="php5-dom less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068871" comment="php5-enchant less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068872" comment="php5-exif less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068873" comment="php5-fastcgi less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068874" comment="php5-fileinfo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068875" comment="php5-ftp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068876" comment="php5-gd less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068877" comment="php5-gettext less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068878" comment="php5-gmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068879" comment="php5-hash less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068880" comment="php5-iconv less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068881" comment="php5-imap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068882" comment="php5-intl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068883" comment="php5-json less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068884" comment="php5-ldap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068885" comment="php5-mbstring less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068886" comment="php5-mcrypt less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068887" comment="php5-mysql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068888" comment="php5-odbc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068889" comment="php5-openssl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068890" comment="php5-pcntl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068891" comment="php5-pdo less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068892" comment="php5-pear less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068893" comment="php5-pgsql less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068894" comment="php5-phar less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068895" comment="php5-posix less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068896" comment="php5-pspell less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068897" comment="php5-readline less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068898" comment="php5-shmop less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068899" comment="php5-snmp less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068900" comment="php5-soap less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068901" comment="php5-sockets less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068902" comment="php5-sqlite less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068903" comment="php5-suhosin less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068904" comment="php5-sysvmsg less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068905" comment="php5-sysvsem less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068906" comment="php5-sysvshm less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068907" comment="php5-tidy less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068908" comment="php5-tokenizer less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068909" comment="php5-wddx less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068910" comment="php5-xmlreader less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068911" comment="php5-xmlrpc less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068912" comment="php5-xmlwriter less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068913" comment="php5-xsl less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068914" comment="php5-zip less than 5.3.3-0.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068915" comment="php5-zlib less than 5.3.3-0.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1944</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944" source="CVE"/>
	<description>
	Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
	</description>
 </metadata>
<!-- cd72141a4a2c36f269eff232ec6708d6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069541" comment="libxml2-32bit less than 2.7.7-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069542" comment="libxml2-devel-32bit less than 2.7.7-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069543" comment="libxml2-devel less than 2.7.7-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069544" comment="libxml2-doc less than 2.7.7-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069545" comment="libxml2 less than 2.7.7-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1945</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1945" source="CVE"/>
	<description>
	The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation.
	</description>
 </metadata>
<!-- 1e74836471c6894ff95148b3678bed51 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068770" comment="libopenssl-devel less than 1.0.0-6.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068771" comment="libopenssl1_0_0-32bit less than 1.0.0-6.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068772" comment="libopenssl1_0_0 less than 1.0.0-6.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068773" comment="openssl-doc less than 1.0.0-6.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068774" comment="openssl less than 1.0.0-6.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1946</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1946" source="CVE"/>
	<description>
	gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
	</description>
 </metadata>
<!-- 8470f081bcf2589f5a4afff578cce927 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069065" comment="libgnomesu-devel less than 1.0.0-322.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069066" comment="libgnomesu-lang less than 1.0.0-322.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069067" comment="libgnomesu0 less than 1.0.0-322.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069068" comment="libgnomesu less than 1.0.0-322.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1957</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1957" source="CVE"/>
	<description>
	The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length.
	</description>
 </metadata>
<!-- a20b166da1111917ae5d5aa5dbf7ca99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070977" comment="wireshark-devel less than 1.4.4-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070963" comment="wireshark less than 1.4.4-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1958</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1958" source="CVE"/>
	<description>
	Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.
	</description>
 </metadata>
<!-- a20b166da1111917ae5d5aa5dbf7ca99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070977" comment="wireshark-devel less than 1.4.4-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070963" comment="wireshark less than 1.4.4-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1959</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1959" source="CVE"/>
	<description>
	The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read.
	</description>
 </metadata>
<!-- a20b166da1111917ae5d5aa5dbf7ca99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070977" comment="wireshark-devel less than 1.4.4-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070963" comment="wireshark less than 1.4.4-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2107</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2107" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.22 and earlier on Android, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to a "universal cross-site scripting vulnerability."
	</description>
 </metadata>
<!-- 931c185c734406ba968974da48456a5e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068742" comment="flash-player less than 10.3.181.22-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2110</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2110" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.23 and earlier on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in June 2011.
	</description>
 </metadata>
<!-- 93a53abff8eee51575c6753b4d8fd245 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068815" comment="flash-player less than 10.3.181.26-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2130</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2130" source="CVE"/>
	<description>
	Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2134, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2134</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2134" source="CVE"/>
	<description>
	Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2135</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2135" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2140, CVE-2011-2417, and CVE-2011-2425.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2136</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2136" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2138 and CVE-2011-2416.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2137</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2137" source="CVE"/>
	<description>
	Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2414, and CVE-2011-2415.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2138</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2138" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2416.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2139</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2139" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2140</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2140" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2145</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2145" source="CVE"/>
	<description>
	mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 though 4.1, and VMware ESX 3.0.3 through 4.1, when a Solaris or FreeBSD guest OS is used, allows guest OS users to modify arbitrary guest OS files via unspecified vectors, related to a "procedural error."
	</description>
 </metadata>
<!-- c4e28e547afb00402ad9f9c0f5fc2ae0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068745" comment="libvmtools-devel less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068746" comment="libvmtools0 less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068747" comment="open-vm-tools-gui less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068748" comment="open-vm-tools less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068749" comment="vmware-guest-kmp-default less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068750" comment="vmware-guest-kmp-desktop less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068751" comment="vmware-guest-kmp-pae less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2146</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2146" source="CVE"/>
	<description>
	mount.vmhgfs in the VMware Host Guest File System (HGFS) in VMware Workstation 7.1.x before 7.1.4, VMware Player 3.1.x before 3.1.4, VMware Fusion 3.1.x before 3.1.3, VMware ESXi 3.5 though 4.1, and VMware ESX 3.0.3 through 4.1 allows guest OS users to determine the existence of host OS files and directories via unspecified vectors.
	</description>
 </metadata>
<!-- c4e28e547afb00402ad9f9c0f5fc2ae0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068745" comment="libvmtools-devel less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068746" comment="libvmtools0 less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068747" comment="open-vm-tools-gui less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068748" comment="open-vm-tools less than 2011.05.27-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068749" comment="vmware-guest-kmp-default less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068750" comment="vmware-guest-kmp-desktop less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068751" comment="vmware-guest-kmp-pae less than 2011.05.27_k2.6.34.8_0.2-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2174</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2174" source="CVE"/>
	<description>
	Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression.
	</description>
 </metadata>
<!-- a20b166da1111917ae5d5aa5dbf7ca99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070977" comment="wireshark-devel less than 1.4.4-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070963" comment="wireshark less than 1.4.4-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2175</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2175" source="CVE"/>
	<description>
	Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read.
	</description>
 </metadata>
<!-- a20b166da1111917ae5d5aa5dbf7ca99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070977" comment="wireshark-devel less than 1.4.4-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070963" comment="wireshark less than 1.4.4-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2176</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2176" source="CVE"/>
	<description>
	GNOME NetworkManager before 0.8.6 does not properly enforce the auth_admin element in PolicyKit, which allows local users to bypass intended wireless network sharing restrictions via unspecified vectors.
	</description>
 </metadata>
<!-- 66647939795d2cce332db38a214c13fe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071992" comment="NetworkManager-devel less than 0.8-8.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071993" comment="NetworkManager-doc less than 0.8-8.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071994" comment="NetworkManager-glib less than 0.8-8.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071995" comment="NetworkManager-gnome less than 0.8-6.3.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071996" comment="NetworkManager less than 0.8-8.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071997" comment="wpa_supplicant-gui less than 0.7.1-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071998" comment="wpa_supplicant less than 0.7.1-5.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2182</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2182" source="CVE"/>
	<description>
	The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1017.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2186</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2186" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 06019d098717ef9f2db2ce9bc1e98f43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069231" comment="git-web less than 1.7.1-2.5.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2199</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2199" source="CVE"/>
	<description>
	Buffer overflow in tftp-hpa before 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the utimeout option.
	</description>
 </metadata>
<!-- e74e0c39269dfe1acc16a2a30f29772f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069329" comment="tftp less than 0.48-108.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2200</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2200" source="CVE"/>
	<description>
	The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct unspecified state-modification attacks via crafted messages.
	</description>
 </metadata>
<!-- 01f059d53db1dcd61c97bc3fe5d9d1fc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069749" comment="dbus-1-32bit less than 1.2.24-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069750" comment="dbus-1-devel-32bit less than 1.2.24-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069751" comment="dbus-1-devel-doc less than 1.2.24-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069752" comment="dbus-1-devel less than 1.2.24-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069753" comment="dbus-1 less than 1.2.24-2.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2202</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2202" source="CVE"/>
	<description>
	The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a "file path injection vulnerability."
	</description>
 </metadata>
<!-- 305cdf02c65b5f2bea22d190e09eea68 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070978" comment="apache2-mod_php5 less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070979" comment="php5-bcmath less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070980" comment="php5-bz2 less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070981" comment="php5-calendar less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070982" comment="php5-ctype less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070983" comment="php5-curl less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070984" comment="php5-dba less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070985" comment="php5-devel less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070986" comment="php5-dom less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070987" comment="php5-enchant less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070988" comment="php5-exif less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070989" comment="php5-fastcgi less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070990" comment="php5-fileinfo less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070991" comment="php5-ftp less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070992" comment="php5-gd less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070993" comment="php5-gettext less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070994" comment="php5-gmp less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070995" comment="php5-hash less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070996" comment="php5-iconv less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070997" comment="php5-imap less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070998" comment="php5-intl less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070999" comment="php5-json less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071000" comment="php5-ldap less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071001" comment="php5-mbstring less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071002" comment="php5-mcrypt less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071003" comment="php5-mysql less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071004" comment="php5-odbc less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071005" comment="php5-openssl less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071006" comment="php5-pcntl less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071007" comment="php5-pdo less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071008" comment="php5-pear less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071009" comment="php5-pgsql less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071010" comment="php5-phar less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071011" comment="php5-posix less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071012" comment="php5-pspell less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071013" comment="php5-readline less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071014" comment="php5-shmop less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071015" comment="php5-snmp less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071016" comment="php5-soap less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071017" comment="php5-sockets less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071018" comment="php5-sqlite less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071019" comment="php5-suhosin less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071020" comment="php5-sysvmsg less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071021" comment="php5-sysvsem less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071022" comment="php5-sysvshm less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071023" comment="php5-tidy less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071024" comment="php5-tokenizer less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071025" comment="php5-wddx less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071026" comment="php5-xmlreader less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071027" comment="php5-xmlrpc less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071028" comment="php5-xmlwriter less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071029" comment="php5-xsl less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071030" comment="php5-zip less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071031" comment="php5-zlib less than 5.3.3-0.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2203</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203" source="CVE"/>
	<description>
	The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2204</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2204" source="CVE"/>
	<description>
	Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.
	</description>
 </metadata>
<!-- 78b2c924b42150079ccd7e9ad1292166 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070165" comment="tomcat6-admin-webapps less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070166" comment="tomcat6-docs-webapp less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070167" comment="tomcat6-el-1_0-api less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070168" comment="tomcat6-javadoc less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070169" comment="tomcat6-jsp-2_1-api less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070170" comment="tomcat6-lib less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070171" comment="tomcat6-servlet-2_5-api less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070172" comment="tomcat6-webapps less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070173" comment="tomcat6 less than 6.0.24-5.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2212</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2212" source="CVE"/>
	<description>
	Buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to "virtqueue in and out requests."
	</description>
 </metadata>
<!-- 2024c1363543d030771d5eb0c6da3294 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068544" comment="kvm less than 0.12.5-1.8.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2213</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2213" source="CVE"/>
	<description>
	The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2362</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2362" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2363</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2363" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2364</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2364" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2365</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2365" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2371</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2371" source="CVE"/>
	<description>
	Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2372</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2372" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36f533ea4b7de54f8f074a0997eec3c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070632" comment="MozillaThunderbird-devel less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070633" comment="MozillaThunderbird-translations-common less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070634" comment="MozillaThunderbird-translations-other less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070635" comment="MozillaThunderbird less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070636" comment="enigmail less than 1.1.2+3.1.15-0.21.1"/>
		</criteria>
	</criteria>
	<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
		</criteria>
	</criteria>
	<!-- bb7e205f97b96042a2cd8ac77511f85a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070600" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070601" comment="MozillaFirefox-translations-common less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070602" comment="MozillaFirefox-translations-other less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070603" comment="MozillaFirefox less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070604" comment="mozilla-js192-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070605" comment="mozilla-js192 less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070606" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070607" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070608" comment="mozilla-xulrunner192-devel less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070609" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070610" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070611" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070612" comment="mozilla-xulrunner192-translations-common less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070613" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070614" comment="mozilla-xulrunner192-translations-other less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070615" comment="mozilla-xulrunner192 less than 1.9.2.23-1.2.1"/>
		</criteria>
	</criteria>
	<!-- cab6aa62d3abda3ed54003544ab205ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2373</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2373" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2374</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2374" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2376</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2376" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2377</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2377" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73ddc4e7ca81ecadf467d7694afb5da9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069284" comment="MozillaThunderbird-devel less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069285" comment="MozillaThunderbird-translations-common less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069286" comment="MozillaThunderbird-translations-other less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069287" comment="MozillaThunderbird less than 3.1.11-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069288" comment="enigmail less than 1.1.2-9.11.1"/>
		</criteria>
	</criteria>
	<!-- 77aae74d965dacf8f7fea9a98e022ee0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069289" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069290" comment="MozillaFirefox-translations-common less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069291" comment="MozillaFirefox-translations-other less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069275" comment="MozillaFirefox less than 3.6.18-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069292" comment="mozilla-js192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069293" comment="mozilla-js192 less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069276" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069294" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069295" comment="mozilla-xulrunner192-devel less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069296" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069277" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069297" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069298" comment="mozilla-xulrunner192-translations-common less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069299" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069300" comment="mozilla-xulrunner192-translations-other less than 1.9.2.18-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069280" comment="mozilla-xulrunner192 less than 1.9.2.18-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2378</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2378" source="CVE"/>
	<description>
	The appendChild function in Mozilla Firefox before 3.6.20, Thunderbird 3.x before 3.1.12, SeaMonkey 2.x, and possibly other products does not properly handle DOM objects, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to dereferencing of a "dangling pointer."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7e280d5e296b096ea886856af521c756 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070068" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070069" comment="MozillaFirefox-translations-common less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070070" comment="MozillaFirefox-translations-other less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070071" comment="MozillaFirefox less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070072" comment="mozilla-js192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070073" comment="mozilla-js192 less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070074" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070075" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070076" comment="mozilla-xulrunner192-devel less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070077" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070078" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070079" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070080" comment="mozilla-xulrunner192-translations-common less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070081" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070082" comment="mozilla-xulrunner192-translations-other less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070083" comment="mozilla-xulrunner192 less than 1.9.2.20-1.2.1"/>
		</criteria>
	</criteria>
	<!-- fb1b8b9a1da94e992f85d96a9e86ce6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070096" comment="MozillaThunderbird-devel less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070097" comment="MozillaThunderbird-translations-common less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070098" comment="MozillaThunderbird-translations-other less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070099" comment="MozillaThunderbird less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070100" comment="enigmail less than 1.1.2+3.1.12-0.15.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2414</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2414" source="CVE"/>
	<description>
	Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2415.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2415</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2415" source="CVE"/>
	<description>
	Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2414.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2416</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2416" source="CVE"/>
	<description>
	Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2138.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2417</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2417" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2425.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2425</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2425" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2417.
	</description>
 </metadata>
<!-- dce9c92fac33e8ca4d8dcbd4e1f1457e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069765" comment="flash-player less than 10.3.183.5-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2426</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2426" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ActionScript Virtual Machine (AVM) component in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 4378ca0d8a45268e92cecdbb88fefbc4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2427</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2427" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ActionScript Virtual Machine (AVM) component in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to execute arbitrary code or cause a denial of service via unspecified vectors.
	</description>
 </metadata>
<!-- 4378ca0d8a45268e92cecdbb88fefbc4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2428</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2428" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to execute arbitrary code or cause a denial of service (browser crash) via unspecified vectors, related to a "logic error issue."
	</description>
 </metadata>
<!-- 4378ca0d8a45268e92cecdbb88fefbc4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2429</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2429" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, related to a "security control bypass."
	</description>
 </metadata>
<!-- 4378ca0d8a45268e92cecdbb88fefbc4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2430</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2430" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to execute arbitrary code via crafted streaming media, related to a "logic error vulnerability."
	</description>
 </metadata>
<!-- 4378ca0d8a45268e92cecdbb88fefbc4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2431</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2431" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "security bypass vulnerability."
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2432</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2432" source="CVE"/>
	<description>
	Buffer overflow in the U3D TIFF Resource in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2433</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2433" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2434 and CVE-2011-2437.
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2434</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2434" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2433 and CVE-2011-2437.
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2435</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2435" source="CVE"/>
	<description>
	Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2436</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2436" source="CVE"/>
	<description>
	Heap-based buffer overflow in the image-parsing library in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2437</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2437" source="CVE"/>
	<description>
	Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2433 and CVE-2011-2434.
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2438</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2438" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the image-parsing library in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2439</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2439" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "memory leakage condition vulnerability."
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2440</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2440" source="CVE"/>
	<description>
	Use-after-free vulnerability in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2441</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2441" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in CoolType.dll in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2442</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2442" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error vulnerability."
	</description>
 </metadata>
<!-- 66e9f522352e95b04bf26a59ca5931ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071819" comment="acroread less than 9.4.6-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2444</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2444" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to inject arbitrary web script or HTML via a crafted URL, related to a "universal cross-site scripting issue," as exploited in the wild in September 2011.
	</description>
 </metadata>
<!-- 4378ca0d8a45268e92cecdbb88fefbc4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2445</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2445" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, CVE-2011-2459, and CVE-2011-2460.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2450</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2450" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2451</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2451" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, CVE-2011-2459, and CVE-2011-2460.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2452</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2452" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, CVE-2011-2459, and CVE-2011-2460.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2453</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2453" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2454, CVE-2011-2455, CVE-2011-2459, and CVE-2011-2460.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2454</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2454" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2455, CVE-2011-2459, and CVE-2011-2460.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2455</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2455" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2459, and CVE-2011-2460.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2456</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2456" source="CVE"/>
	<description>
	Buffer overflow in Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2457</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2457" source="CVE"/>
	<description>
	Stack-based buffer overflow in Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2458</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2458" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, when Internet Explorer is used, allows remote attackers to bypass the cross-domain policy via a crafted web site.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2459</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2459" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, and CVE-2011-2460.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2460</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2460" source="CVE"/>
	<description>
	Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, Linux, and Solaris and before 11.1.102.59 on Android, and Adobe AIR before 3.1.0.4880, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2445, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, and CVE-2011-2459.
	</description>
 </metadata>
<!-- 151334645fa5c20ca5e8560b17738faa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070593" comment="flash-player less than 10.3.183.10-0.2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2462</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2462" source="CVE"/>
	<description>
	Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
	</description>
 </metadata>
<!-- 7a28daed990f5f7affeae25da429f096 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072548" comment="acroread less than 9.4.7-0.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2464</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464" source="CVE"/>
	<description>
	Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
	</description>
 </metadata>
<!-- 5019180b9271355c2696343590de8910 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069362" comment="bind-chrootenv less than 9.7.3P3-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069363" comment="bind-devel less than 9.7.3P3-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069364" comment="bind-doc less than 9.7.3P3-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069365" comment="bind-libs-32bit less than 9.7.3P3-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069366" comment="bind-libs less than 9.7.3P3-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069367" comment="bind-utils less than 9.7.3P3-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069368" comment="bind less than 9.7.3P3-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2483</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483" source="CVE"/>
	<description>
	crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1203a0f3573083938c2f055723f70986 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070134" comment="libxcrypt-32bit less than 3.0.3-5.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070135" comment="libxcrypt-devel less than 3.0.3-5.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070136" comment="libxcrypt less than 3.0.3-5.11.1"/>
		</criteria>
	</criteria>
	<!-- 305cdf02c65b5f2bea22d190e09eea68 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070978" comment="apache2-mod_php5 less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070979" comment="php5-bcmath less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070980" comment="php5-bz2 less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070981" comment="php5-calendar less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070982" comment="php5-ctype less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070983" comment="php5-curl less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070984" comment="php5-dba less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070985" comment="php5-devel less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070986" comment="php5-dom less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070987" comment="php5-enchant less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070988" comment="php5-exif less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070989" comment="php5-fastcgi less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070990" comment="php5-fileinfo less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070991" comment="php5-ftp less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070992" comment="php5-gd less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070993" comment="php5-gettext less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070994" comment="php5-gmp less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070995" comment="php5-hash less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070996" comment="php5-iconv less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070997" comment="php5-imap less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070998" comment="php5-intl less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070999" comment="php5-json less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071000" comment="php5-ldap less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071001" comment="php5-mbstring less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071002" comment="php5-mcrypt less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071003" comment="php5-mysql less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071004" comment="php5-odbc less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071005" comment="php5-openssl less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071006" comment="php5-pcntl less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071007" comment="php5-pdo less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071008" comment="php5-pear less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071009" comment="php5-pgsql less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071010" comment="php5-phar less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071011" comment="php5-posix less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071012" comment="php5-pspell less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071013" comment="php5-readline less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071014" comment="php5-shmop less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071015" comment="php5-snmp less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071016" comment="php5-soap less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071017" comment="php5-sockets less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071018" comment="php5-sqlite less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071019" comment="php5-suhosin less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071020" comment="php5-sysvmsg less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071021" comment="php5-sysvsem less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071022" comment="php5-sysvshm less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071023" comment="php5-tidy less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071024" comment="php5-tokenizer less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071025" comment="php5-wddx less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071026" comment="php5-xmlreader less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071027" comment="php5-xmlrpc less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071028" comment="php5-xmlwriter less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071029" comment="php5-xsl less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071030" comment="php5-zip less than 5.3.3-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071031" comment="php5-zlib less than 5.3.3-0.21.1"/>
		</criteria>
	</criteria>
	<!-- 7bfd4ad374ada2532385c1cddb327651 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070137" comment="man-pages less than 3.25-2.3.1"/>
	</criteria>
	<!-- 83e49c71509df6c6ac13e1dabcc6f9fc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069896" comment="glibc-32bit less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069897" comment="glibc-devel-32bit less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069898" comment="glibc-devel less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069899" comment="glibc-html less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069900" comment="glibc-i18ndata less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069901" comment="glibc-info less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069902" comment="glibc-locale-32bit less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069903" comment="glibc-locale less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069904" comment="glibc-obsolete less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069905" comment="glibc-profile-32bit less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069906" comment="glibc-profile less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069907" comment="glibc less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069908" comment="libxcrypt-32bit less than 3.0.3-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069909" comment="libxcrypt-devel less than 3.0.3-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069910" comment="libxcrypt less than 3.0.3-5.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069911" comment="nscd less than 2.11.2-3.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069912" comment="pam-modules-32bit less than 11.3-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069913" comment="pam-modules less than 11.3-0.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069914" comment="pwdutils-plugin-audit less than 3.2.10-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069915" comment="pwdutils-rpasswd-32bit less than 3.2.10-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069916" comment="pwdutils-rpasswd less than 3.2.10-2.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069917" comment="pwdutils less than 3.2.10-2.3.1"/>
		</criteria>
	</criteria>
	<!-- f6360b0b232cbce713fb92352f2176a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070084" comment="yast2-core-devel less than 2.19.4-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070085" comment="yast2-core less than 2.19.4-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2484</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2484" source="CVE"/>
	<description>
	The add_del_listener function in kernel/taskstats.c in the Linux kernel 2.6.39.1 and earlier does not prevent multiple registrations of exit handlers, which allows local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2486</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2486" source="CVE"/>
	<description>
	nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.
	</description>
 </metadata>
<!-- 98c7bf888f34919f3988d9553a111848 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072369" comment="nspluginwrapper less than 1.4.4.0.15-0.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2489</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2489" source="CVE"/>
	<description>
	Multiple off-by-one errors in opiesu.c in opiesu in OPIE 2.4.1-test1 and earlier might allow local users to gain privileges via a crafted command line.
	</description>
 </metadata>
<!-- c1a465be477e492510eb8c7518a096c6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069574" comment="opie-32bit less than 2.4-706.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069575" comment="opie less than 2.4-706.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069576" comment="permissions less than 2010.04.23.1140-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2490</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2490" source="CVE"/>
	<description>
	opielogin.c in opielogin in OPIE 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.
	</description>
 </metadata>
<!-- c1a465be477e492510eb8c7518a096c6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069574" comment="opie-32bit less than 2.4-706.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069575" comment="opie less than 2.4-706.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069576" comment="permissions less than 2010.04.23.1140-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2491</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2491" source="CVE"/>
	<description>
	The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2495</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2495" source="CVE"/>
	<description>
	fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user's password.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2496</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2496" source="CVE"/>
	<description>
	Integer overflow in the vma_to_resize function in mm/mremap.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (BUG_ON and system crash) via a crafted mremap system call that expands a memory mapping.
	</description>
 </metadata>
<!-- 49903363274aef98b63c36d4cc181bfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069646" comment="kernel-debug-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069647" comment="kernel-debug-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069648" comment="kernel-debug less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069649" comment="kernel-default-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069650" comment="kernel-default-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069651" comment="kernel-default less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069652" comment="kernel-desktop-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069653" comment="kernel-desktop-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069654" comment="kernel-desktop less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069655" comment="kernel-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069656" comment="kernel-ec2-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069657" comment="kernel-ec2-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069658" comment="kernel-ec2-extra less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069659" comment="kernel-ec2 less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069660" comment="kernel-pae-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069661" comment="kernel-pae-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069662" comment="kernel-pae less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069663" comment="kernel-source-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069664" comment="kernel-source less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069665" comment="kernel-syms less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069666" comment="kernel-trace-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069667" comment="kernel-trace-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069668" comment="kernel-trace less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069669" comment="kernel-vanilla-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069670" comment="kernel-vanilla-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069671" comment="kernel-vanilla less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069672" comment="kernel-vmi-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069673" comment="kernel-vmi-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069674" comment="kernel-vmi less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069675" comment="kernel-xen-base less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069676" comment="kernel-xen-devel less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069677" comment="kernel-xen less than 2.6.34.10-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069678" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.2-19.1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069679" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.2-19.1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2501</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2501" source="CVE"/>
	<description>
	The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3e1a79e075c3043f0af222bdae8a9d1d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069815" comment="libpng12-0-32bit less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069816" comment="libpng12-0 less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069817" comment="libpng12-compat-devel less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069818" comment="libpng12-devel less than 1.2.46-7.3.1"/>
		</criteria>
	</criteria>
	<!-- e9885661bc23c9505c7d46637e89a85d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069819" comment="libpng14-14-32bit less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069820" comment="libpng14-14 less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069821" comment="libpng14-compat-devel less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069822" comment="libpng14-devel less than 1.4.3-3.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2511</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2511" source="CVE"/>
	<description>
	Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
	</description>
 </metadata>
<!-- 49cd31b5f88d4b09ed1e05037d04743e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069773" comment="libvirt-client less than 0.8.1-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069774" comment="libvirt-devel less than 0.8.1-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069775" comment="libvirt-doc less than 0.8.1-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069776" comment="libvirt-python less than 0.8.1-4.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069777" comment="libvirt less than 0.8.1-4.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2512</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2512" source="CVE"/>
	<description>
	The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.
	</description>
 </metadata>
<!-- 2024c1363543d030771d5eb0c6da3294 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068544" comment="kvm less than 0.12.5-1.8.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2513</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2513" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- d03637101d342fa9e2bc6b4cc4f82c41 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069523" comment="icedtea-web-javadoc less than 1.1-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069524" comment="icedtea-web less than 1.1-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2514</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2514" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- d03637101d342fa9e2bc6b4cc4f82c41 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069523" comment="icedtea-web-javadoc less than 1.1-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069524" comment="icedtea-web less than 1.1-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2522</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522" source="CVE"/>
	<description>
	Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
	</description>
 </metadata>
<!-- d940a6474caa7b17688b06e6c87812e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070317" comment="ldapsmb less than 1.34b-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070318" comment="libldb-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070319" comment="libldb0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070320" comment="libnetapi-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070321" comment="libnetapi0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070322" comment="libsmbclient-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070323" comment="libsmbclient0-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070324" comment="libsmbclient0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070325" comment="libsmbsharemodes-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070326" comment="libsmbsharemodes0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070327" comment="libtalloc-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070328" comment="libtalloc2 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070329" comment="libtdb-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070330" comment="libtdb1-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070331" comment="libtdb1 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070332" comment="libtevent-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070333" comment="libtevent0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070334" comment="libwbclient-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070335" comment="libwbclient0-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070336" comment="libwbclient0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070337" comment="samba-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070338" comment="samba-client-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070339" comment="samba-client less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070340" comment="samba-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070341" comment="samba-doc less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070342" comment="samba-krb-printing less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070343" comment="samba-winbind-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070344" comment="samba-winbind less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070345" comment="samba less than 3.5.4-5.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2524</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2524" source="CVE"/>
	<description>
	Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a %2e%2e (encoded dot dot) in a URI.
	</description>
 </metadata>
<!-- 5c190dd2c002fb592cc6bd8739db3d5a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069743" comment="libsoup-2_4-1-32bit less than 2.30.1-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069744" comment="libsoup-2_4-1 less than 2.30.1-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2525</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2525" source="CVE"/>
	<description>
	The qdisc_notify function in net/sched/sch_api.c in the Linux kernel before 2.6.35 does not prevent tc_fill_qdisc function calls referencing builtin (aka CQ_F_BUILTIN) Qdisc structures, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted call.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2526</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526" source="CVE"/>
	<description>
	Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
	</description>
 </metadata>
<!-- 78b2c924b42150079ccd7e9ad1292166 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070165" comment="tomcat6-admin-webapps less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070166" comment="tomcat6-docs-webapp less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070167" comment="tomcat6-el-1_0-api less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070168" comment="tomcat6-javadoc less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070169" comment="tomcat6-jsp-2_1-api less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070170" comment="tomcat6-lib less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070171" comment="tomcat6-servlet-2_5-api less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070172" comment="tomcat6-webapps less than 6.0.24-5.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070173" comment="tomcat6 less than 6.0.24-5.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2534</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2534" source="CVE"/>
	<description>
	Buffer overflow in the clusterip_proc_write function in net/ipv4/netfilter/ipt_CLUSTERIP.c in the Linux kernel before 2.6.39 might allow local users to cause a denial of service or have unspecified other impact via a crafted write operation, related to string data that lacks a terminating '\0' character.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2597</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2597" source="CVE"/>
	<description>
	The Lucent/Ascend file parser in Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7, and 1.6.0 allows remote attackers to cause a denial of service (infinite loop) via malformed packets.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 877307b8185fd17546b7883de5fd0aff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071929" comment="wireshark-devel less than 1.4.10-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071930" comment="wireshark less than 1.4.10-0.7.1"/>
		</criteria>
	</criteria>
	<!-- a20b166da1111917ae5d5aa5dbf7ca99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070977" comment="wireshark-devel less than 1.4.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070963" comment="wireshark less than 1.4.4-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2609</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2609" source="CVE"/>
	<description>
	Opera before 11.50 does not properly restrict data: URIs, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2610</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2610" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.50 has unknown impact and attack vectors, related to a "moderately severe issue."
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2611</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2611" source="CVE"/>
	<description>
	Unspecified vulnerability in the printing functionality in Opera before 11.50 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted web page.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2612</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2612" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via unknown content on a web page, as demonstrated by progorod.ru.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2613</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2613" source="CVE"/>
	<description>
	The Array.prototype.join method in Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via a non-array object that contains initial holes.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2614</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2614" source="CVE"/>
	<description>
	The SVG implementation in Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via vectors involving a path on which many characters are drawn.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2615</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2615" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.50 allows remote attackers to cause a denial of service (application hang) via unknown content on a web page, as demonstrated by domiteca.com.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2616</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2616" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.50 allows remote attackers to cause a denial of service (memory consumption) via unknown content on a web page, as demonstrated by test262.ecmascript.org.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2617</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2617" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via vectors related to selecting a text node, and closed pop-up windows, removed pop-up windows, and IFRAME elements.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2618</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2618" source="CVE"/>
	<description>
	Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via web script that moves a (1) AUDIO element or (2) VIDEO element between windows.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2619</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2619" source="CVE"/>
	<description>
	Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via a gradient with many stops, related to the implementation of CANVAS elements, SVG, and Cascading Style Sheets (CSS).
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2620</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2620" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via vectors involving SVG animation.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2621</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2621" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via vectors related to form layout.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2622</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2622" source="CVE"/>
	<description>
	Unspecified vulnerability in the Web Workers implementation in Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2623</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2623" source="CVE"/>
	<description>
	Unspecified vulnerability in the SVG BiDi implementation in Opera before 11.50 allows remote attackers to cause a denial of service (application crash or hang) via unknown vectors.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2624</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2624" source="CVE"/>
	<description>
	Opera before 11.50 allows user-assisted remote attackers to cause a denial of service (application hang) via a large table, which is not properly handled during a print preview.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2625</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2625" source="CVE"/>
	<description>
	Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via a SELECT element that contains many OPTION elements.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2626</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2626" source="CVE"/>
	<description>
	Opera before 11.50 allows remote attackers to cause a denial of service (application crash) by using "injected script" to set the SRC attribute of an IFRAME element.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2627</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2627" source="CVE"/>
	<description>
	Unspecified vulnerability in the DOM implementation in Opera before 11.50 allows remote attackers to cause a denial of service (application crash) via unknown content on a web page, as demonstrated by live.com.
	</description>
 </metadata>
<!-- 9a69632d18a0c4d27eb4549c86733e1d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069434" comment="opera-gtk less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069435" comment="opera-kde4 less than 11.50-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069436" comment="opera less than 11.50-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2685</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2685" source="CVE"/>
	<description>
	Stack-based buffer overflow in the Lotus Word Pro import filter in LibreOffice before 3.3.3 allows remote attackers to execute arbitrary code via a crafted .lwp file.
	</description>
 </metadata>
<!-- e5d1ec0e78f991f9e59bcab8c305b089 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071032" comment="libreoffice-base-drivers-mysql less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071033" comment="libreoffice-base-drivers-postgresql less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071034" comment="libreoffice-base-extensions less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071035" comment="libreoffice-base less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071036" comment="libreoffice-branding-upstream less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071037" comment="libreoffice-calc-extensions less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071038" comment="libreoffice-calc less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071039" comment="libreoffice-converter less than 3.3-2.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071040" comment="libreoffice-draw-extensions less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071041" comment="libreoffice-draw less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071042" comment="libreoffice-filters-optional less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071043" comment="libreoffice-gnome less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071044" comment="libreoffice-help-cs less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071045" comment="libreoffice-help-da less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071046" comment="libreoffice-help-de less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071047" comment="libreoffice-help-en-GB less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071048" comment="libreoffice-help-en-US less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071049" comment="libreoffice-help-en-ZA less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071050" comment="libreoffice-help-es less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071051" comment="libreoffice-help-et less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071052" comment="libreoffice-help-fr less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071053" comment="libreoffice-help-gl less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071054" comment="libreoffice-help-gu-IN less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071055" comment="libreoffice-help-hi-IN less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071056" comment="libreoffice-help-hu less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071057" comment="libreoffice-help-it less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071058" comment="libreoffice-help-ja less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071059" comment="libreoffice-help-km less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071060" comment="libreoffice-help-ko less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071061" comment="libreoffice-help-nl less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071062" comment="libreoffice-help-pl less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071063" comment="libreoffice-help-pt-BR less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071064" comment="libreoffice-help-pt less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071065" comment="libreoffice-help-ru less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071066" comment="libreoffice-help-sl less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071067" comment="libreoffice-help-sv less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071068" comment="libreoffice-help-zh-CN less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071069" comment="libreoffice-help-zh-TW less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071070" comment="libreoffice-icon-theme-crystal less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071071" comment="libreoffice-icon-theme-galaxy less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071072" comment="libreoffice-icon-theme-hicontrast less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071073" comment="libreoffice-icon-theme-oxygen less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071074" comment="libreoffice-icon-theme-tango less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071075" comment="libreoffice-icon-themes-prebuilt less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071076" comment="libreoffice-impress-extensions less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071077" comment="libreoffice-impress less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071078" comment="libreoffice-kde4 less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071079" comment="libreoffice-kde less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071080" comment="libreoffice-l10n-af less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071081" comment="libreoffice-l10n-ar less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071082" comment="libreoffice-l10n-be-BY less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071083" comment="libreoffice-l10n-bg less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071084" comment="libreoffice-l10n-br less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071085" comment="libreoffice-l10n-ca less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071086" comment="libreoffice-l10n-cs less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071087" comment="libreoffice-l10n-cy less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071088" comment="libreoffice-l10n-da less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071089" comment="libreoffice-l10n-de less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071090" comment="libreoffice-l10n-el less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071091" comment="libreoffice-l10n-en-GB less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071092" comment="libreoffice-l10n-en-ZA less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071093" comment="libreoffice-l10n-es less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071094" comment="libreoffice-l10n-et less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071095" comment="libreoffice-l10n-fi less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071096" comment="libreoffice-l10n-fr less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071097" comment="libreoffice-l10n-ga less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071098" comment="libreoffice-l10n-gl less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071099" comment="libreoffice-l10n-gu-IN less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071100" comment="libreoffice-l10n-he less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071101" comment="libreoffice-l10n-hi-IN less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071102" comment="libreoffice-l10n-hr less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071103" comment="libreoffice-l10n-hu less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071104" comment="libreoffice-l10n-it less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071105" comment="libreoffice-l10n-ja less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071106" comment="libreoffice-l10n-ka less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071107" comment="libreoffice-l10n-km less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071108" comment="libreoffice-l10n-ko less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071109" comment="libreoffice-l10n-lt less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071110" comment="libreoffice-l10n-mk less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071111" comment="libreoffice-l10n-nb less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071112" comment="libreoffice-l10n-nl less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071113" comment="libreoffice-l10n-nn less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071114" comment="libreoffice-l10n-nr less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071115" comment="libreoffice-l10n-pa-IN less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071116" comment="libreoffice-l10n-pl less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071117" comment="libreoffice-l10n-prebuilt less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071118" comment="libreoffice-l10n-pt-BR less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071119" comment="libreoffice-l10n-pt less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071120" comment="libreoffice-l10n-ru less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071121" comment="libreoffice-l10n-rw less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071122" comment="libreoffice-l10n-sh less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071123" comment="libreoffice-l10n-sk less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071124" comment="libreoffice-l10n-sl less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071125" comment="libreoffice-l10n-sr less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071126" comment="libreoffice-l10n-ss less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071127" comment="libreoffice-l10n-st less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071128" comment="libreoffice-l10n-sv less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071129" comment="libreoffice-l10n-tg less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071130" comment="libreoffice-l10n-th less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071131" comment="libreoffice-l10n-tr less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071132" comment="libreoffice-l10n-ts less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071133" comment="libreoffice-l10n-uk less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071134" comment="libreoffice-l10n-ve less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071135" comment="libreoffice-l10n-vi less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071136" comment="libreoffice-l10n-xh less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071137" comment="libreoffice-l10n-zh-CN less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071138" comment="libreoffice-l10n-zh-TW less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071139" comment="libreoffice-l10n-zu less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071140" comment="libreoffice-languagetool-ca less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071141" comment="libreoffice-languagetool-de less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071142" comment="libreoffice-languagetool-en less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071143" comment="libreoffice-languagetool-es less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071144" comment="libreoffice-languagetool-fr less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071145" comment="libreoffice-languagetool-gl less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071146" comment="libreoffice-languagetool-it less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071147" comment="libreoffice-languagetool-nl less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071148" comment="libreoffice-languagetool-pl less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071149" comment="libreoffice-languagetool-ro less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071150" comment="libreoffice-languagetool-ru less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071151" comment="libreoffice-languagetool-sk less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071152" comment="libreoffice-languagetool-sv less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071153" comment="libreoffice-languagetool less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071154" comment="libreoffice-mailmerge less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071155" comment="libreoffice-math less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071156" comment="libreoffice-mono less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071157" comment="libreoffice-officebean less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071158" comment="libreoffice-openclipart less than 3.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071159" comment="libreoffice-pyuno less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071160" comment="libreoffice-testtool less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071161" comment="libreoffice-writer-extensions less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071162" comment="libreoffice-writer less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071163" comment="libreoffice less than 3.4.2.6-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2690</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2690" source="CVE"/>
	<description>
	Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3e1a79e075c3043f0af222bdae8a9d1d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069815" comment="libpng12-0-32bit less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069816" comment="libpng12-0 less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069817" comment="libpng12-compat-devel less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069818" comment="libpng12-devel less than 1.2.46-7.3.1"/>
		</criteria>
	</criteria>
	<!-- e9885661bc23c9505c7d46637e89a85d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069819" comment="libpng14-14-32bit less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069820" comment="libpng14-14 less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069821" comment="libpng14-compat-devel less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069822" comment="libpng14-devel less than 1.4.3-3.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2691</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2691" source="CVE"/>
	<description>
	The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3e1a79e075c3043f0af222bdae8a9d1d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069815" comment="libpng12-0-32bit less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069816" comment="libpng12-0 less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069817" comment="libpng12-compat-devel less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069818" comment="libpng12-devel less than 1.2.46-7.3.1"/>
		</criteria>
	</criteria>
	<!-- e9885661bc23c9505c7d46637e89a85d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069819" comment="libpng14-14-32bit less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069820" comment="libpng14-14 less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069821" comment="libpng14-compat-devel less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069822" comment="libpng14-devel less than 1.4.3-3.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2692</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2692" source="CVE"/>
	<description>
	The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3e1a79e075c3043f0af222bdae8a9d1d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069815" comment="libpng12-0-32bit less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069816" comment="libpng12-0 less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069817" comment="libpng12-compat-devel less than 1.2.46-7.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069818" comment="libpng12-devel less than 1.2.46-7.3.1"/>
		</criteria>
	</criteria>
	<!-- e9885661bc23c9505c7d46637e89a85d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069819" comment="libpng14-14-32bit less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069820" comment="libpng14-14 less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069821" comment="libpng14-compat-devel less than 1.4.3-3.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069822" comment="libpng14-devel less than 1.4.3-3.3.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2694</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
	</description>
 </metadata>
<!-- d940a6474caa7b17688b06e6c87812e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070317" comment="ldapsmb less than 1.34b-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070318" comment="libldb-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070319" comment="libldb0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070320" comment="libnetapi-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070321" comment="libnetapi0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070322" comment="libsmbclient-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070323" comment="libsmbclient0-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070324" comment="libsmbclient0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070325" comment="libsmbsharemodes-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070326" comment="libsmbsharemodes0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070327" comment="libtalloc-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070328" comment="libtalloc2 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070329" comment="libtdb-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070330" comment="libtdb1-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070331" comment="libtdb1 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070332" comment="libtevent-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070333" comment="libtevent0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070334" comment="libwbclient-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070335" comment="libwbclient0-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070336" comment="libwbclient0 less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070337" comment="samba-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070338" comment="samba-client-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070339" comment="samba-client less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070340" comment="samba-devel less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070341" comment="samba-doc less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070342" comment="samba-krb-printing less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070343" comment="samba-winbind-32bit less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070344" comment="samba-winbind less than 3.5.4-5.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070345" comment="samba less than 3.5.4-5.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2696</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696" source="CVE"/>
	<description>
	Integer overflow in libsndfile before 1.0.25 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PARIS Audio Format (PAF) file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 0a3778d99694a2946c6bcab5bbdcfbf5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069634" comment="libsndfile-32bit less than 1.0.20-8.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069635" comment="libsndfile-devel less than 1.0.20-8.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069636" comment="libsndfile less than 1.0.20-8.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2697</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697" source="CVE"/>
	<description>
	foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.
	</description>
 </metadata>
<!-- 28502a13e2703a098afa56aea749c4da -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069766" comment="foomatic-filters less than 4.0.1-7.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2698</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2698" source="CVE"/>
	<description>
	Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet.
	</description>
 </metadata>
<!-- a20b166da1111917ae5d5aa5dbf7ca99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070977" comment="wireshark-devel less than 1.4.4-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070963" comment="wireshark less than 1.4.4-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2699</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2699" source="CVE"/>
	<description>
	The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2713</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2713" source="CVE"/>
	<description>
	oowriter in OpenOffice.org 3.3.0 and LibreOffice before 3.4.3 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted DOC file that triggers an out-of-bounds read in the DOC sprm parser.
	</description>
 </metadata>
<!-- e5d1ec0e78f991f9e59bcab8c305b089 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071032" comment="libreoffice-base-drivers-mysql less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071033" comment="libreoffice-base-drivers-postgresql less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071034" comment="libreoffice-base-extensions less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071035" comment="libreoffice-base less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071036" comment="libreoffice-branding-upstream less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071037" comment="libreoffice-calc-extensions less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071038" comment="libreoffice-calc less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071039" comment="libreoffice-converter less than 3.3-2.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071040" comment="libreoffice-draw-extensions less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071041" comment="libreoffice-draw less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071042" comment="libreoffice-filters-optional less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071043" comment="libreoffice-gnome less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071044" comment="libreoffice-help-cs less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071045" comment="libreoffice-help-da less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071046" comment="libreoffice-help-de less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071047" comment="libreoffice-help-en-GB less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071048" comment="libreoffice-help-en-US less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071049" comment="libreoffice-help-en-ZA less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071050" comment="libreoffice-help-es less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071051" comment="libreoffice-help-et less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071052" comment="libreoffice-help-fr less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071053" comment="libreoffice-help-gl less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071054" comment="libreoffice-help-gu-IN less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071055" comment="libreoffice-help-hi-IN less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071056" comment="libreoffice-help-hu less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071057" comment="libreoffice-help-it less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071058" comment="libreoffice-help-ja less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071059" comment="libreoffice-help-km less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071060" comment="libreoffice-help-ko less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071061" comment="libreoffice-help-nl less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071062" comment="libreoffice-help-pl less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071063" comment="libreoffice-help-pt-BR less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071064" comment="libreoffice-help-pt less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071065" comment="libreoffice-help-ru less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071066" comment="libreoffice-help-sl less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071067" comment="libreoffice-help-sv less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071068" comment="libreoffice-help-zh-CN less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071069" comment="libreoffice-help-zh-TW less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071070" comment="libreoffice-icon-theme-crystal less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071071" comment="libreoffice-icon-theme-galaxy less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071072" comment="libreoffice-icon-theme-hicontrast less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071073" comment="libreoffice-icon-theme-oxygen less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071074" comment="libreoffice-icon-theme-tango less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071075" comment="libreoffice-icon-themes-prebuilt less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071076" comment="libreoffice-impress-extensions less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071077" comment="libreoffice-impress less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071078" comment="libreoffice-kde4 less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071079" comment="libreoffice-kde less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071080" comment="libreoffice-l10n-af less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071081" comment="libreoffice-l10n-ar less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071082" comment="libreoffice-l10n-be-BY less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071083" comment="libreoffice-l10n-bg less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071084" comment="libreoffice-l10n-br less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071085" comment="libreoffice-l10n-ca less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071086" comment="libreoffice-l10n-cs less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071087" comment="libreoffice-l10n-cy less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071088" comment="libreoffice-l10n-da less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071089" comment="libreoffice-l10n-de less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071090" comment="libreoffice-l10n-el less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071091" comment="libreoffice-l10n-en-GB less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071092" comment="libreoffice-l10n-en-ZA less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071093" comment="libreoffice-l10n-es less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071094" comment="libreoffice-l10n-et less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071095" comment="libreoffice-l10n-fi less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071096" comment="libreoffice-l10n-fr less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071097" comment="libreoffice-l10n-ga less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071098" comment="libreoffice-l10n-gl less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071099" comment="libreoffice-l10n-gu-IN less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071100" comment="libreoffice-l10n-he less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071101" comment="libreoffice-l10n-hi-IN less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071102" comment="libreoffice-l10n-hr less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071103" comment="libreoffice-l10n-hu less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071104" comment="libreoffice-l10n-it less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071105" comment="libreoffice-l10n-ja less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071106" comment="libreoffice-l10n-ka less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071107" comment="libreoffice-l10n-km less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071108" comment="libreoffice-l10n-ko less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071109" comment="libreoffice-l10n-lt less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071110" comment="libreoffice-l10n-mk less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071111" comment="libreoffice-l10n-nb less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071112" comment="libreoffice-l10n-nl less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071113" comment="libreoffice-l10n-nn less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071114" comment="libreoffice-l10n-nr less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071115" comment="libreoffice-l10n-pa-IN less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071116" comment="libreoffice-l10n-pl less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071117" comment="libreoffice-l10n-prebuilt less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071118" comment="libreoffice-l10n-pt-BR less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071119" comment="libreoffice-l10n-pt less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071120" comment="libreoffice-l10n-ru less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071121" comment="libreoffice-l10n-rw less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071122" comment="libreoffice-l10n-sh less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071123" comment="libreoffice-l10n-sk less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071124" comment="libreoffice-l10n-sl less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071125" comment="libreoffice-l10n-sr less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071126" comment="libreoffice-l10n-ss less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071127" comment="libreoffice-l10n-st less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071128" comment="libreoffice-l10n-sv less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071129" comment="libreoffice-l10n-tg less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071130" comment="libreoffice-l10n-th less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071131" comment="libreoffice-l10n-tr less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071132" comment="libreoffice-l10n-ts less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071133" comment="libreoffice-l10n-uk less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071134" comment="libreoffice-l10n-ve less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071135" comment="libreoffice-l10n-vi less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071136" comment="libreoffice-l10n-xh less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071137" comment="libreoffice-l10n-zh-CN less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071138" comment="libreoffice-l10n-zh-TW less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071139" comment="libreoffice-l10n-zu less than 3.4.2.6-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071140" comment="libreoffice-languagetool-ca less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071141" comment="libreoffice-languagetool-de less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071142" comment="libreoffice-languagetool-en less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071143" comment="libreoffice-languagetool-es less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071144" comment="libreoffice-languagetool-fr less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071145" comment="libreoffice-languagetool-gl less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071146" comment="libreoffice-languagetool-it less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071147" comment="libreoffice-languagetool-nl less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071148" comment="libreoffice-languagetool-pl less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071149" comment="libreoffice-languagetool-ro less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071150" comment="libreoffice-languagetool-ru less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071151" comment="libreoffice-languagetool-sk less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071152" comment="libreoffice-languagetool-sv less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071153" comment="libreoffice-languagetool less than 1.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071154" comment="libreoffice-mailmerge less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071155" comment="libreoffice-math less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071156" comment="libreoffice-mono less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071157" comment="libreoffice-officebean less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071158" comment="libreoffice-openclipart less than 3.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071159" comment="libreoffice-pyuno less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071160" comment="libreoffice-testtool less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071161" comment="libreoffice-writer-extensions less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071162" comment="libreoffice-writer less than 3.4.2.6-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071163" comment="libreoffice less than 3.4.2.6-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2721</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2721" source="CVE"/>
	<description>
	Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations.
	</description>
 </metadata>
<!-- 0500df4a063baae744825f31cec14fda -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070043" comment="clamav-db less than 0.97.2-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070027" comment="clamav less than 0.97.2-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2723</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2723" source="CVE"/>
	<description>
	The skb_gro_header_slow function in include/linux/netdevice.h in the Linux kernel before 2.6.39.4, when Generic Receive Offload (GRO) is enabled, resets certain fields in incorrect situations, which allows remote attackers to cause a denial of service (system crash) via crafted network traffic.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2746</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2746" source="CVE"/>
	<description>
	Unspecified vulnerability in Kernel/Modules/AdminPackageManager.pm in OTRS-Core in Open Ticket Request System (OTRS) 2.x before 2.4.11 and 3.x before 3.0.10 allows remote authenticated administrators to read arbitrary files via unknown vectors.
	</description>
 </metadata>
<!-- 7a4994201ebbf622d3bf8c07e2628e08 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070455" comment="otrs-doc less than 2.4.11-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070456" comment="otrs-itsm less than 2.1.4-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070457" comment="otrs less than 2.4.11-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2748</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748" source="CVE"/>
	<description>
	The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.
	</description>
 </metadata>
<!-- 06fe92cb7bce1d49d50f04e51c8dee27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070458" comment="dhcp-client less than 4.1.2.ESV.1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070459" comment="dhcp-devel less than 4.1.2.ESV.1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070460" comment="dhcp-doc less than 4.1.2.ESV.1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070461" comment="dhcp-relay less than 4.1.2.ESV.1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070462" comment="dhcp-server less than 4.1.2.ESV.1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070463" comment="dhcp less than 4.1.2.ESV.1-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2749</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749" source="CVE"/>
	<description>
	The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.
	</description>
 </metadata>
<!-- 06fe92cb7bce1d49d50f04e51c8dee27 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070458" comment="dhcp-client less than 4.1.2.ESV.1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070459" comment="dhcp-devel less than 4.1.2.ESV.1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070460" comment="dhcp-doc less than 4.1.2.ESV.1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070461" comment="dhcp-relay less than 4.1.2.ESV.1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070462" comment="dhcp-server less than 4.1.2.ESV.1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070463" comment="dhcp less than 4.1.2.ESV.1-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2766</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2766" source="CVE"/>
	<description>
	The FCGI (aka Fast CGI) module 0.70 through 0.73 for Perl, as used by CGI::Fast, uses environment variable values from one request during processing of a later request, which allows remote attackers to bypass authentication via crafted HTTP headers.
	</description>
 </metadata>
<!-- 776cd2f01150979dc58245fcbfd2392a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072339" comment="FastCGI-devel less than 2.4.0-144.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072340" comment="FastCGI less than 2.4.0-144.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072341" comment="perl-FastCGI less than 2.4.0-144.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2821</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2821" source="CVE"/>
	<description>
	Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.
	</description>
 </metadata>
<!-- 207fec374ff1a184b0158fb376464674 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072468" comment="libxml2-32bit less than 2.7.7-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072469" comment="libxml2-devel-32bit less than 2.7.7-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072470" comment="libxml2-devel less than 2.7.7-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072471" comment="libxml2-doc less than 2.7.7-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072472" comment="libxml2 less than 2.7.7-4.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2834</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2834" source="CVE"/>
	<description>
	Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
	</description>
 </metadata>
<!-- 207fec374ff1a184b0158fb376464674 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072468" comment="libxml2-32bit less than 2.7.7-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072469" comment="libxml2-devel-32bit less than 2.7.7-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072470" comment="libxml2-devel less than 2.7.7-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072471" comment="libxml2-doc less than 2.7.7-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072472" comment="libxml2 less than 2.7.7-4.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2895</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895" source="CVE"/>
	<description>
	The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.
	</description>
 </metadata>
<!-- 9dda0f2bfb9f1422aa7fc5a2f932d4ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072049" comment="libpciaccess0-32bit less than 7.5-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072050" comment="libpciaccess0-devel less than 7.5-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072051" comment="libpciaccess0 less than 7.5-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072052" comment="xorg-x11-devel-32bit less than 7.5-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072053" comment="xorg-x11-devel less than 7.5-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072054" comment="xorg-x11-libs-32bit less than 7.5-4.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072055" comment="xorg-x11-libs less than 7.5-4.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2896</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896" source="CVE"/>
	<description>
	The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.
	</description>
 </metadata>
<!-- 86259f64d533828155b9a6c21359aab2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071509" comment="gimp-branding-upstream less than 2.6.8-7.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071510" comment="gimp-devel less than 2.6.8-7.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071511" comment="gimp-help-browser less than 2.6.8-7.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071512" comment="gimp-lang less than 2.6.8-7.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071513" comment="gimp-module-hal less than 2.6.8-7.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071514" comment="gimp-plugins-python less than 2.6.8-7.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071515" comment="gimp less than 2.6.8-7.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2898</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2898" source="CVE"/>
	<description>
	net/packet/af_packet.c in the Linux kernel before 2.6.39.3 does not properly restrict user-space access to certain packet data structures associated with VLAN Tag Control Information, which allows local users to obtain potentially sensitive information via a crafted application.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2899</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2899" source="CVE"/>
	<description>
	pysmb.py in system-config-printer 0.6.x and 0.7.x, as used in foomatic-gui and possibly other products, allows remote SMB servers to execute arbitrary commands via shell metacharacters in the (1) NetBIOS or (2) workgroup name, which are not properly handled when searching for network printers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6e4795fbccae0b5fa2ab50fc30e5706c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072266" comment="python-cupshelpers less than 1.2.0-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072267" comment="system-config-printer-lang less than 1.2.0-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072268" comment="system-config-printer less than 1.2.0-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072269" comment="udev-configure-printer less than 1.2.0-2.5.1"/>
		</criteria>
	</criteria>
	<!-- 83a0cbd0ebb1e92108cdb3fc5bbaba20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072482" comment="python-cupshelpers less than 1.2.0-2.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072483" comment="system-config-printer-lang less than 1.2.0-2.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072484" comment="system-config-printer less than 1.2.0-2.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072485" comment="udev-configure-printer less than 1.2.0-2.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2911</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2911" source="CVE"/>
	<description>
	Integer overflow in the CSoundFile::ReadWav function in src/load_wav.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted WAV file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 5879da1a9d0938afb02361f57e0c32fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070029" comment="libmodplug-devel less than 0.8.8.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070030" comment="libmodplug0-32bit less than 0.8.8.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070031" comment="libmodplug0 less than 0.8.8.4-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2912</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2912" source="CVE"/>
	<description>
	Stack-based buffer overflow in the CSoundFile::ReadS3M function in src/load_s3m.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted S3M file with an invalid offset.
	</description>
 </metadata>
<!-- 5879da1a9d0938afb02361f57e0c32fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070029" comment="libmodplug-devel less than 0.8.8.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070030" comment="libmodplug0-32bit less than 0.8.8.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070031" comment="libmodplug0 less than 0.8.8.4-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2913</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2913" source="CVE"/>
	<description>
	Off-by-one error in the CSoundFile::ReadAMS function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (stack memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of samples.
	</description>
 </metadata>
<!-- 5879da1a9d0938afb02361f57e0c32fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070029" comment="libmodplug-devel less than 0.8.8.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070030" comment="libmodplug0-32bit less than 0.8.8.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070031" comment="libmodplug0 less than 0.8.8.4-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2914</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2914" source="CVE"/>
	<description>
	Off-by-one error in the CSoundFile::ReadDSM function in src/load_dms.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted DSM file with a large number of samples.
	</description>
 </metadata>
<!-- 5879da1a9d0938afb02361f57e0c32fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070029" comment="libmodplug-devel less than 0.8.8.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070030" comment="libmodplug0-32bit less than 0.8.8.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070031" comment="libmodplug0 less than 0.8.8.4-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2915</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2915" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2915" source="CVE"/>
	<description>
	Off-by-one error in the CSoundFile::ReadAMS2 function in src/load_ams.cpp in libmodplug before 0.8.8.4 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a crafted AMS file with a large number of instruments.
	</description>
 </metadata>
<!-- 5879da1a9d0938afb02361f57e0c32fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070029" comment="libmodplug-devel less than 0.8.8.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070030" comment="libmodplug0-32bit less than 0.8.8.4-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070031" comment="libmodplug0 less than 0.8.8.4-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2918</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2918" source="CVE"/>
	<description>
	The Performance Events subsystem in the Linux kernel before 3.1 does not properly handle event overflows associated with PERF_COUNT_SW_CPU_CLOCK events, which allows local users to cause a denial of service (system hang) via a crafted application.
	</description>
 </metadata>
<!-- ebc337cc8b33a14657744237f336f151 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071733" comment="kernel-debug-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071734" comment="kernel-debug-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071735" comment="kernel-debug less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071736" comment="kernel-default-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071737" comment="kernel-default-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071738" comment="kernel-default less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071739" comment="kernel-desktop-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071740" comment="kernel-desktop-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071741" comment="kernel-desktop less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071742" comment="kernel-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071743" comment="kernel-ec2-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071744" comment="kernel-ec2-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071745" comment="kernel-ec2-extra less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071746" comment="kernel-ec2 less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071747" comment="kernel-pae-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071748" comment="kernel-pae-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071749" comment="kernel-pae less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071750" comment="kernel-source-vanilla less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071751" comment="kernel-source less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071752" comment="kernel-syms less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071753" comment="kernel-trace-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071754" comment="kernel-trace-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071755" comment="kernel-trace less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071756" comment="kernel-vanilla-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071757" comment="kernel-vanilla-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071758" comment="kernel-vanilla less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071759" comment="kernel-vmi-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071760" comment="kernel-vmi-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071761" comment="kernel-vmi less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071762" comment="kernel-xen-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071763" comment="kernel-xen-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071764" comment="kernel-xen less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071765" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.4-19.1.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071766" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.4-19.1.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2930</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2930" source="CVE"/>
	<description>
	Multiple SQL injection vulnerabilities in the quote_table_name method in the ActiveRecord adapters in activerecord/lib/active_record/connection_adapters/ in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allow remote attackers to execute arbitrary SQL commands via a crafted column name.
	</description>
 </metadata>
<!-- e7571c569adf76cb0d4b776f86783aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072125" comment="rubygem-actionmailer-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072126" comment="rubygem-actionmailer less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072127" comment="rubygem-actionpack-2_3 less than 2.3.14-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072128" comment="rubygem-actionpack less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072129" comment="rubygem-activerecord-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072130" comment="rubygem-activerecord less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072131" comment="rubygem-activeresource-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072132" comment="rubygem-activeresource less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072133" comment="rubygem-activesupport-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072134" comment="rubygem-activesupport less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072135" comment="rubygem-rack less than 1.1.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072136" comment="rubygem-rails-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072137" comment="rubygem-rails less than 2.3.14-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2931</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2931" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name.
	</description>
 </metadata>
<!-- e7571c569adf76cb0d4b776f86783aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072125" comment="rubygem-actionmailer-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072126" comment="rubygem-actionmailer less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072127" comment="rubygem-actionpack-2_3 less than 2.3.14-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072128" comment="rubygem-actionpack less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072129" comment="rubygem-activerecord-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072130" comment="rubygem-activerecord less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072131" comment="rubygem-activeresource-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072132" comment="rubygem-activeresource less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072133" comment="rubygem-activesupport-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072134" comment="rubygem-activesupport less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072135" comment="rubygem-rack less than 1.1.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072136" comment="rubygem-rails-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072137" comment="rubygem-rails less than 2.3.14-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2939</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2939" source="CVE"/>
	<description>
	Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7b7b46d499429792296c1ff337f83f82 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071917" comment="icedtea-web-javadoc less than 1.1.4-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071918" comment="icedtea-web less than 1.1.4-0.2.1"/>
		</criteria>
	</criteria>
	<!-- f79eba00059fac40fd464f92477c09c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072025" comment="perl-32bit less than 5.12.1-2.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072026" comment="perl-base-32bit less than 5.12.1-2.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072027" comment="perl-base less than 5.12.1-2.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072028" comment="perl-doc less than 5.12.1-2.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072029" comment="perl less than 5.12.1-2.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2964</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2964" source="CVE"/>
	<description>
	foomaticrip.c in foomatic-rip in foomatic-filters in Foomatic 4.0.6 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file, a different vulnerability than CVE-2011-2697.
	</description>
 </metadata>
<!-- 28502a13e2703a098afa56aea749c4da -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069766" comment="foomatic-filters less than 4.0.1-7.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2980</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2980" source="CVE"/>
	<description>
	Untrusted search path vulnerability in the ThinkPadSensor::Startup function in Mozilla Firefox before 3.6.20, Thunderbird 3.x before 3.1.12, allows local users to gain privileges by leveraging write access in an unspecified directory to place a Trojan horse DLL that is loaded into the running Firefox process.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7e280d5e296b096ea886856af521c756 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070068" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070069" comment="MozillaFirefox-translations-common less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070070" comment="MozillaFirefox-translations-other less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070071" comment="MozillaFirefox less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070072" comment="mozilla-js192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070073" comment="mozilla-js192 less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070074" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070075" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070076" comment="mozilla-xulrunner192-devel less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070077" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070078" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070079" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070080" comment="mozilla-xulrunner192-translations-common less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070081" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070082" comment="mozilla-xulrunner192-translations-other less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070083" comment="mozilla-xulrunner192 less than 1.9.2.20-1.2.1"/>
		</criteria>
	</criteria>
	<!-- fb1b8b9a1da94e992f85d96a9e86ce6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070096" comment="MozillaThunderbird-devel less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070097" comment="MozillaThunderbird-translations-common less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070098" comment="MozillaThunderbird-translations-other less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070099" comment="MozillaThunderbird less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070100" comment="enigmail less than 1.1.2+3.1.12-0.15.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2981</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2981" source="CVE"/>
	<description>
	The event-management implementation in Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly select the context for script to run in, which allows remote attackers to bypass the Same Origin Policy or execute arbitrary JavaScript code with chrome privileges via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7e280d5e296b096ea886856af521c756 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070068" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070069" comment="MozillaFirefox-translations-common less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070070" comment="MozillaFirefox-translations-other less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070071" comment="MozillaFirefox less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070072" comment="mozilla-js192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070073" comment="mozilla-js192 less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070074" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070075" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070076" comment="mozilla-xulrunner192-devel less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070077" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070078" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070079" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070080" comment="mozilla-xulrunner192-translations-common less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070081" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070082" comment="mozilla-xulrunner192-translations-other less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070083" comment="mozilla-xulrunner192 less than 1.9.2.20-1.2.1"/>
		</criteria>
	</criteria>
	<!-- fb1b8b9a1da94e992f85d96a9e86ce6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070096" comment="MozillaThunderbird-devel less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070097" comment="MozillaThunderbird-translations-common less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070098" comment="MozillaThunderbird-translations-other less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070099" comment="MozillaThunderbird less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070100" comment="enigmail less than 1.1.2+3.1.12-0.15.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2982</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2982" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7e280d5e296b096ea886856af521c756 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070068" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070069" comment="MozillaFirefox-translations-common less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070070" comment="MozillaFirefox-translations-other less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070071" comment="MozillaFirefox less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070072" comment="mozilla-js192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070073" comment="mozilla-js192 less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070074" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070075" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070076" comment="mozilla-xulrunner192-devel less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070077" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070078" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070079" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070080" comment="mozilla-xulrunner192-translations-common less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070081" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070082" comment="mozilla-xulrunner192-translations-other less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070083" comment="mozilla-xulrunner192 less than 1.9.2.20-1.2.1"/>
		</criteria>
	</criteria>
	<!-- fb1b8b9a1da94e992f85d96a9e86ce6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070096" comment="MozillaThunderbird-devel less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070097" comment="MozillaThunderbird-translations-common less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070098" comment="MozillaThunderbird-translations-other less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070099" comment="MozillaThunderbird less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070100" comment="enigmail less than 1.1.2+3.1.12-0.15.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2983</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2983" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7e280d5e296b096ea886856af521c756 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070068" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070069" comment="MozillaFirefox-translations-common less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070070" comment="MozillaFirefox-translations-other less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070071" comment="MozillaFirefox less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070072" comment="mozilla-js192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070073" comment="mozilla-js192 less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070074" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070075" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070076" comment="mozilla-xulrunner192-devel less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070077" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070078" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070079" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070080" comment="mozilla-xulrunner192-translations-common less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070081" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070082" comment="mozilla-xulrunner192-translations-other less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070083" comment="mozilla-xulrunner192 less than 1.9.2.20-1.2.1"/>
		</criteria>
	</criteria>
	<!-- fb1b8b9a1da94e992f85d96a9e86ce6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070096" comment="MozillaThunderbird-devel less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070097" comment="MozillaThunderbird-translations-common less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070098" comment="MozillaThunderbird-translations-other less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070099" comment="MozillaThunderbird less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070100" comment="enigmail less than 1.1.2+3.1.12-0.15.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2984</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2984" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly handle the dropping of a tab element, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by establishing a content area and registering for drop events.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7e280d5e296b096ea886856af521c756 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070068" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070069" comment="MozillaFirefox-translations-common less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070070" comment="MozillaFirefox-translations-other less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070071" comment="MozillaFirefox less than 3.6.20-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070072" comment="mozilla-js192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070073" comment="mozilla-js192 less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070074" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070075" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070076" comment="mozilla-xulrunner192-devel less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070077" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070078" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070079" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070080" comment="mozilla-xulrunner192-translations-common less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070081" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070082" comment="mozilla-xulrunner192-translations-other less than 1.9.2.20-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070083" comment="mozilla-xulrunner192 less than 1.9.2.20-1.2.1"/>
		</criteria>
	</criteria>
	<!-- fb1b8b9a1da94e992f85d96a9e86ce6a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070096" comment="MozillaThunderbird-devel less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070097" comment="MozillaThunderbird-translations-common less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070098" comment="MozillaThunderbird-translations-other less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070099" comment="MozillaThunderbird less than 3.1.12-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070100" comment="enigmail less than 1.1.2+3.1.12-0.15.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2985</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2985" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 521e57c67c81daf4b0ad3b877ae01d21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070062" comment="seamonkey-dom-inspector less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070063" comment="seamonkey-irc less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070064" comment="seamonkey-translations-common less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070065" comment="seamonkey-translations-other less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070066" comment="seamonkey-venkman less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070067" comment="seamonkey less than 2.3-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2986</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2986" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products, when the Direct2D (aka D2D) API is used on Windows, allows remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas.
	</description>
 </metadata>
<!-- 521e57c67c81daf4b0ad3b877ae01d21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070062" comment="seamonkey-dom-inspector less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070063" comment="seamonkey-irc less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070064" comment="seamonkey-translations-common less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070065" comment="seamonkey-translations-other less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070066" comment="seamonkey-venkman less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070067" comment="seamonkey less than 2.3-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2987</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2987" source="CVE"/>
	<description>
	Heap-based buffer overflow in Almost Native Graphics Layer Engine (ANGLE), as used in the WebGL implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products might allow remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 521e57c67c81daf4b0ad3b877ae01d21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070062" comment="seamonkey-dom-inspector less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070063" comment="seamonkey-irc less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070064" comment="seamonkey-translations-common less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070065" comment="seamonkey-translations-other less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070066" comment="seamonkey-venkman less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070067" comment="seamonkey less than 2.3-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2988</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2988" source="CVE"/>
	<description>
	Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader.
	</description>
 </metadata>
<!-- 521e57c67c81daf4b0ad3b877ae01d21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070062" comment="seamonkey-dom-inspector less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070063" comment="seamonkey-irc less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070064" comment="seamonkey-translations-common less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070065" comment="seamonkey-translations-other less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070066" comment="seamonkey-venkman less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070067" comment="seamonkey less than 2.3-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2989</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2989" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement WebGL, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 521e57c67c81daf4b0ad3b877ae01d21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070062" comment="seamonkey-dom-inspector less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070063" comment="seamonkey-irc less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070064" comment="seamonkey-translations-common less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070065" comment="seamonkey-translations-other less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070066" comment="seamonkey-venkman less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070067" comment="seamonkey less than 2.3-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2990</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2990" source="CVE"/>
	<description>
	The implementation of Content Security Policy (CSP) violation reports in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not remove proxy-authorization credentials from the listed request headers, which allows attackers to obtain sensitive information by reading a report, related to incorrect host resolution that occurs with certain redirects.
	</description>
 </metadata>
<!-- 521e57c67c81daf4b0ad3b877ae01d21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070062" comment="seamonkey-dom-inspector less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070063" comment="seamonkey-irc less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070064" comment="seamonkey-translations-common less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070065" comment="seamonkey-translations-other less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070066" comment="seamonkey-venkman less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070067" comment="seamonkey less than 2.3-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2991</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2991" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement JavaScript, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 521e57c67c81daf4b0ad3b877ae01d21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070062" comment="seamonkey-dom-inspector less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070063" comment="seamonkey-irc less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070064" comment="seamonkey-translations-common less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070065" comment="seamonkey-translations-other less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070066" comment="seamonkey-venkman less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070067" comment="seamonkey less than 2.3-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2992</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2992" source="CVE"/>
	<description>
	The Ogg reader in the browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 521e57c67c81daf4b0ad3b877ae01d21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070062" comment="seamonkey-dom-inspector less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070063" comment="seamonkey-irc less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070064" comment="seamonkey-translations-common less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070065" comment="seamonkey-translations-other less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070066" comment="seamonkey-venkman less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070067" comment="seamonkey less than 2.3-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2993</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2993" source="CVE"/>
	<description>
	The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not prevent calls from unsigned JavaScript code to signed code, which allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site, a different vulnerability than CVE-2008-2801.
	</description>
 </metadata>
<!-- 521e57c67c81daf4b0ad3b877ae01d21 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070062" comment="seamonkey-dom-inspector less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070063" comment="seamonkey-irc less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070064" comment="seamonkey-translations-common less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070065" comment="seamonkey-translations-other less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070066" comment="seamonkey-venkman less than 2.3-2.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070067" comment="seamonkey less than 2.3-2.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2995</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2995" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36f533ea4b7de54f8f074a0997eec3c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070632" comment="MozillaThunderbird-devel less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070633" comment="MozillaThunderbird-translations-common less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070634" comment="MozillaThunderbird-translations-other less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070635" comment="MozillaThunderbird less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070636" comment="enigmail less than 1.1.2+3.1.15-0.21.1"/>
		</criteria>
	</criteria>
	<!-- bb7e205f97b96042a2cd8ac77511f85a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070600" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070601" comment="MozillaFirefox-translations-common less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070602" comment="MozillaFirefox-translations-other less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070603" comment="MozillaFirefox less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070604" comment="mozilla-js192-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070605" comment="mozilla-js192 less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070606" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070607" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070608" comment="mozilla-xulrunner192-devel less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070609" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070610" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070611" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070612" comment="mozilla-xulrunner192-translations-common less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070613" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070614" comment="mozilla-xulrunner192-translations-other less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070615" comment="mozilla-xulrunner192 less than 1.9.2.23-1.2.1"/>
		</criteria>
	</criteria>
	<!-- cab6aa62d3abda3ed54003544ab205ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2996</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2996" source="CVE"/>
	<description>
	Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
		</criteria>
	</criteria>
	<!-- bb7e205f97b96042a2cd8ac77511f85a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070600" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070601" comment="MozillaFirefox-translations-common less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070602" comment="MozillaFirefox-translations-other less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070603" comment="MozillaFirefox less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070604" comment="mozilla-js192-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070605" comment="mozilla-js192 less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070606" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070607" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070608" comment="mozilla-xulrunner192-devel less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070609" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070610" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070611" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070612" comment="mozilla-xulrunner192-translations-common less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070613" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070614" comment="mozilla-xulrunner192-translations-other less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070615" comment="mozilla-xulrunner192 less than 1.9.2.23-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2997</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2997" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36f533ea4b7de54f8f074a0997eec3c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070632" comment="MozillaThunderbird-devel less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070633" comment="MozillaThunderbird-translations-common less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070634" comment="MozillaThunderbird-translations-other less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070635" comment="MozillaThunderbird less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070636" comment="enigmail less than 1.1.2+3.1.15-0.21.1"/>
		</criteria>
	</criteria>
	<!-- cab6aa62d3abda3ed54003544ab205ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2998</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2998" source="CVE"/>
	<description>
	Integer underflow in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via JavaScript code containing a large RegExp expression.
	</description>
 </metadata>
<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2999</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-2999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2999" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.23 and 4.x through 5, Thunderbird before 6.0, and SeaMonkey before 2.3 do not properly handle "location" as the name of a frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, a different vulnerability than CVE-2010-0170.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36f533ea4b7de54f8f074a0997eec3c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070632" comment="MozillaThunderbird-devel less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070633" comment="MozillaThunderbird-translations-common less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070634" comment="MozillaThunderbird-translations-other less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070635" comment="MozillaThunderbird less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070636" comment="enigmail less than 1.1.2+3.1.15-0.21.1"/>
		</criteria>
	</criteria>
	<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
		</criteria>
	</criteria>
	<!-- bb7e205f97b96042a2cd8ac77511f85a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070600" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070601" comment="MozillaFirefox-translations-common less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070602" comment="MozillaFirefox-translations-other less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070603" comment="MozillaFirefox less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070604" comment="mozilla-js192-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070605" comment="mozilla-js192 less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070606" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070607" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070608" comment="mozilla-xulrunner192-devel less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070609" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070610" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070611" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070612" comment="mozilla-xulrunner192-translations-common less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070613" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070614" comment="mozilla-xulrunner192-translations-other less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070615" comment="mozilla-xulrunner192 less than 1.9.2.23-1.2.1"/>
		</criteria>
	</criteria>
	<!-- cab6aa62d3abda3ed54003544ab205ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3000</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3000" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36f533ea4b7de54f8f074a0997eec3c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070632" comment="MozillaThunderbird-devel less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070633" comment="MozillaThunderbird-translations-common less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070634" comment="MozillaThunderbird-translations-other less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070635" comment="MozillaThunderbird less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070636" comment="enigmail less than 1.1.2+3.1.15-0.21.1"/>
		</criteria>
	</criteria>
	<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
		</criteria>
	</criteria>
	<!-- bb7e205f97b96042a2cd8ac77511f85a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070600" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070601" comment="MozillaFirefox-translations-common less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070602" comment="MozillaFirefox-translations-other less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070603" comment="MozillaFirefox less than 3.6.23-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070604" comment="mozilla-js192-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070605" comment="mozilla-js192 less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070606" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070607" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070608" comment="mozilla-xulrunner192-devel less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070609" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070610" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070611" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070612" comment="mozilla-xulrunner192-translations-common less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070613" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070614" comment="mozilla-xulrunner192-translations-other less than 1.9.2.23-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070615" comment="mozilla-xulrunner192 less than 1.9.2.23-1.2.1"/>
		</criteria>
	</criteria>
	<!-- cab6aa62d3abda3ed54003544ab205ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3001</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3001" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36f533ea4b7de54f8f074a0997eec3c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070632" comment="MozillaThunderbird-devel less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070633" comment="MozillaThunderbird-translations-common less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070634" comment="MozillaThunderbird-translations-other less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070635" comment="MozillaThunderbird less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070636" comment="enigmail less than 1.1.2+3.1.15-0.21.1"/>
		</criteria>
	</criteria>
	<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
		</criteria>
	</criteria>
	<!-- cab6aa62d3abda3ed54003544ab205ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3002</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3002" source="CVE"/>
	<description>
	Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 7.0 and SeaMonkey before 2.4, does not validate the return value of a GrowAtomTable function call, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a memory-allocation error and a resulting buffer overflow.
	</description>
 </metadata>
<!-- cab6aa62d3abda3ed54003544ab205ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3003</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3003" source="CVE"/>
	<description>
	Mozilla Firefox before 7.0 and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unspecified WebGL test case that triggers a memory-allocation error and a resulting out-of-bounds write operation.
	</description>
 </metadata>
<!-- cab6aa62d3abda3ed54003544ab205ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3004</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3004" source="CVE"/>
	<description>
	The JSSubScriptLoader in Mozilla Firefox 4.x through 6 and SeaMonkey before 2.4 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior.
	</description>
 </metadata>
<!-- cab6aa62d3abda3ed54003544ab205ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3005</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3005" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36f533ea4b7de54f8f074a0997eec3c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070632" comment="MozillaThunderbird-devel less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070633" comment="MozillaThunderbird-translations-common less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070634" comment="MozillaThunderbird-translations-other less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070635" comment="MozillaThunderbird less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070636" comment="enigmail less than 1.1.2+3.1.15-0.21.1"/>
		</criteria>
	</criteria>
	<!-- cab6aa62d3abda3ed54003544ab205ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3145</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3145" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 51fc168f20928ccd5e00964a271a69d2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072657" comment="ecryptfs-utils-32bit less than 83-3.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072658" comment="ecryptfs-utils less than 83-3.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3146</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3146" source="CVE"/>
	<description>
	librsvg before 2.34.1 uses the node name to identify the type of node, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "fe," which is misidentified as a RsvgFilterPrimitive.
	</description>
 </metadata>
<!-- 96c88cd365b4d8ec96423137338aaec5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070711" comment="librsvg-32bit less than 2.26.3-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070712" comment="librsvg-devel less than 2.26.3-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070713" comment="librsvg less than 2.26.3-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070714" comment="rsvg-view less than 2.26.3-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3148</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3148" source="CVE"/>
	<description>
	Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
	</description>
 </metadata>
<!-- dd8819840cc1b7ecfa0d007a01e84113 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071644" comment="pam-32bit less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071645" comment="pam-devel-32bit less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071646" comment="pam-devel less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071647" comment="pam-doc less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071648" comment="pam less than 1.1.1.90-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3149</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3149" source="CVE"/>
	<description>
	The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
	</description>
 </metadata>
<!-- dd8819840cc1b7ecfa0d007a01e84113 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071644" comment="pam-32bit less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071645" comment="pam-devel-32bit less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071646" comment="pam-devel less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071647" comment="pam-doc less than 1.1.1.90-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071648" comment="pam less than 1.1.1.90-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3186</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3186" source="CVE"/>
	<description>
	CRLF injection vulnerability in actionpack/lib/action_controller/response.rb in Ruby on Rails 2.3.x before 2.3.13 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the Content-Type header.
	</description>
 </metadata>
<!-- e7571c569adf76cb0d4b776f86783aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072125" comment="rubygem-actionmailer-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072126" comment="rubygem-actionmailer less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072127" comment="rubygem-actionpack-2_3 less than 2.3.14-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072128" comment="rubygem-actionpack less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072129" comment="rubygem-activerecord-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072130" comment="rubygem-activerecord less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072131" comment="rubygem-activeresource-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072132" comment="rubygem-activeresource less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072133" comment="rubygem-activesupport-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072134" comment="rubygem-activesupport less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072135" comment="rubygem-rack less than 1.1.2-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072136" comment="rubygem-rails-2_3 less than 2.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072137" comment="rubygem-rails less than 2.3.14-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3190</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190" source="CVE"/>
	<description>
	Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
	</description>
 </metadata>
<!-- 107858caf83a598d6318507a80dcd92e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071164" comment="tomcat6-admin-webapps less than 6.0.24-5.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071165" comment="tomcat6-docs-webapp less than 6.0.24-5.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071166" comment="tomcat6-el-1_0-api less than 6.0.24-5.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071167" comment="tomcat6-javadoc less than 6.0.24-5.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071168" comment="tomcat6-jsp-2_1-api less than 6.0.24-5.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071169" comment="tomcat6-lib less than 6.0.24-5.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071170" comment="tomcat6-servlet-2_5-api less than 6.0.24-5.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071171" comment="tomcat6-webapps less than 6.0.24-5.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071172" comment="tomcat6 less than 6.0.24-5.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3191</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3191" source="CVE"/>
	<description>
	Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel before 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read request for a directory.
	</description>
 </metadata>
<!-- ebc337cc8b33a14657744237f336f151 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071733" comment="kernel-debug-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071734" comment="kernel-debug-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071735" comment="kernel-debug less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071736" comment="kernel-default-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071737" comment="kernel-default-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071738" comment="kernel-default less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071739" comment="kernel-desktop-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071740" comment="kernel-desktop-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071741" comment="kernel-desktop less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071742" comment="kernel-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071743" comment="kernel-ec2-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071744" comment="kernel-ec2-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071745" comment="kernel-ec2-extra less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071746" comment="kernel-ec2 less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071747" comment="kernel-pae-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071748" comment="kernel-pae-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071749" comment="kernel-pae less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071750" comment="kernel-source-vanilla less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071751" comment="kernel-source less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071752" comment="kernel-syms less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071753" comment="kernel-trace-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071754" comment="kernel-trace-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071755" comment="kernel-trace less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071756" comment="kernel-vanilla-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071757" comment="kernel-vanilla-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071758" comment="kernel-vanilla less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071759" comment="kernel-vmi-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071760" comment="kernel-vmi-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071761" comment="kernel-vmi less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071762" comment="kernel-xen-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071763" comment="kernel-xen-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071764" comment="kernel-xen less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071765" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.4-19.1.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071766" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.4-19.1.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3192</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192" source="CVE"/>
	<description>
	The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- c1d61e3dffd34c8fb6e19bbe9a498b9a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070269" comment="apache2-devel less than 2.2.15-4.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070270" comment="apache2-doc less than 2.2.15-4.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070271" comment="apache2-example-certificates less than 2.2.15-4.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070272" comment="apache2-example-pages less than 2.2.15-4.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070273" comment="apache2-itk less than 2.2.15-4.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070274" comment="apache2-prefork less than 2.2.15-4.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070275" comment="apache2-utils less than 2.2.15-4.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070276" comment="apache2-worker less than 2.2.15-4.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070277" comment="apache2 less than 2.2.15-4.5.1"/>
		</criteria>
	</criteria>
	<!-- f911943c9529ea49152e73793a879875 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071702" comment="apache2-devel less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071703" comment="apache2-doc less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071704" comment="apache2-example-certificates less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071705" comment="apache2-example-pages less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071706" comment="apache2-itk less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071707" comment="apache2-prefork less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071708" comment="apache2-utils less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071709" comment="apache2-worker less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071710" comment="apache2 less than 2.2.15-4.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3193</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3193" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 046a0f93e030f7cb2d9e94762344137e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070910" comment="libQtWebKit-devel less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070911" comment="libQtWebKit4-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070912" comment="libQtWebKit4 less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070913" comment="libqt4-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070914" comment="libqt4-devel-doc-data less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070915" comment="libqt4-devel-doc less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070916" comment="libqt4-devel less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070917" comment="libqt4-qt3support-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070918" comment="libqt4-qt3support less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070919" comment="libqt4-sql-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070920" comment="libqt4-sql-mysql-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070921" comment="libqt4-sql-mysql less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070922" comment="libqt4-sql-postgresql-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070923" comment="libqt4-sql-postgresql less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070924" comment="libqt4-sql-sqlite-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070925" comment="libqt4-sql-sqlite less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070926" comment="libqt4-sql-unixODBC-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070927" comment="libqt4-sql-unixODBC less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070928" comment="libqt4-sql less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070929" comment="libqt4-x11-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070930" comment="libqt4-x11 less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070931" comment="libqt4 less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070932" comment="qt4-x11-tools less than 4.6.3-2.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3194</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3194" source="CVE"/>
	<description>
	Buffer overflow in the TIFF reader in gui/image/qtiffhandler.cpp in Qt 4.7.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the TIFFTAG_SAMPLESPERPIXEL tag in a greyscale TIFF image with multiple samples per pixel.
	</description>
 </metadata>
<!-- 046a0f93e030f7cb2d9e94762344137e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070910" comment="libQtWebKit-devel less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070911" comment="libQtWebKit4-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070912" comment="libQtWebKit4 less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070913" comment="libqt4-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070914" comment="libqt4-devel-doc-data less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070915" comment="libqt4-devel-doc less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070916" comment="libqt4-devel less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070917" comment="libqt4-qt3support-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070918" comment="libqt4-qt3support less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070919" comment="libqt4-sql-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070920" comment="libqt4-sql-mysql-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070921" comment="libqt4-sql-mysql less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070922" comment="libqt4-sql-postgresql-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070923" comment="libqt4-sql-postgresql less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070924" comment="libqt4-sql-sqlite-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070925" comment="libqt4-sql-sqlite less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070926" comment="libqt4-sql-unixODBC-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070927" comment="libqt4-sql-unixODBC less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070928" comment="libqt4-sql less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070929" comment="libqt4-x11-32bit less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070930" comment="libqt4-x11 less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070931" comment="libqt4 less than 4.6.3-2.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070932" comment="qt4-x11-tools less than 4.6.3-2.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3200</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200" source="CVE"/>
	<description>
	Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
	</description>
 </metadata>
<!-- 72da5d2c87190d1ede49421a04c741c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070464" comment="rsyslog-diag-tools less than 5.4.0-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070465" comment="rsyslog-doc less than 5.4.0-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070466" comment="rsyslog-module-gssapi less than 5.4.0-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070467" comment="rsyslog-module-gtls less than 5.4.0-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070468" comment="rsyslog-module-mysql less than 5.4.0-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070469" comment="rsyslog-module-pgsql less than 5.4.0-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070470" comment="rsyslog-module-relp less than 5.4.0-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070471" comment="rsyslog-module-snmp less than 5.4.0-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070472" comment="rsyslog-module-udpspoof less than 5.4.0-3.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070473" comment="rsyslog less than 5.4.0-3.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3205</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3205" source="CVE"/>
	<description>
	Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in Squid 3.0 before 3.0.STABLE26, 3.1 before 3.1.15, and 3.2 before 3.2.0.11 allows remote Gopher servers to cause a denial of service (memory corruption and daemon restart) or possibly have unspecified other impact via a long line in a response.  NOTE: This issue exists because of a CVE-2005-0094 regression.
	</description>
 </metadata>
<!-- fdb03db508d86e0eafbc1473dd870186 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070474" comment="squid3 less than 3.0.STABLE25-2.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3207</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3207" source="CVE"/>
	<description>
	crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.
	</description>
 </metadata>
<!-- 22f9d12d0cd0399a6c2cada91759ee32 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071173" comment="libopenssl-devel less than 1.0.0-6.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071174" comment="libopenssl0_9_8-32bit less than 0.9.8m-3.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071175" comment="libopenssl0_9_8 less than 0.9.8m-3.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071176" comment="libopenssl1_0_0-32bit less than 1.0.0-6.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071177" comment="libopenssl1_0_0 less than 1.0.0-6.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071178" comment="openssl-doc less than 1.0.0-6.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071179" comment="openssl less than 1.0.0-6.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3208</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3208" source="CVE"/>
	<description>
	Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command.
	</description>
 </metadata>
<!-- 7d2c3b8d070d03ca888407dce64803d7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070546" comment="cyrus-imapd-devel less than 2.3.16-8.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070547" comment="cyrus-imapd less than 2.3.16-8.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070548" comment="perl-Cyrus-IMAP less than 2.3.16-8.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070549" comment="perl-Cyrus-SIEVE-managesieve less than 2.3.16-8.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3210</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210" source="CVE"/>
	<description>
	The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
	</description>
 </metadata>
<!-- 22f9d12d0cd0399a6c2cada91759ee32 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071173" comment="libopenssl-devel less than 1.0.0-6.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071174" comment="libopenssl0_9_8-32bit less than 0.9.8m-3.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071175" comment="libopenssl0_9_8 less than 0.9.8m-3.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071176" comment="libopenssl1_0_0-32bit less than 1.0.0-6.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071177" comment="libopenssl1_0_0 less than 1.0.0-6.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071178" comment="openssl-doc less than 1.0.0-6.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071179" comment="openssl less than 1.0.0-6.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3232</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3232" source="CVE"/>
	<description>
	YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36f533ea4b7de54f8f074a0997eec3c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070632" comment="MozillaThunderbird-devel less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070633" comment="MozillaThunderbird-translations-common less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070634" comment="MozillaThunderbird-translations-other less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070635" comment="MozillaThunderbird less than 3.1.15-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070636" comment="enigmail less than 1.1.2+3.1.15-0.21.1"/>
		</criteria>
	</criteria>
	<!-- cab6aa62d3abda3ed54003544ab205ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070616" comment="seamonkey-dom-inspector less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070617" comment="seamonkey-irc less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070618" comment="seamonkey-translations-common less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070619" comment="seamonkey-translations-other less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070620" comment="seamonkey-venkman less than 2.4-1.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070621" comment="seamonkey less than 2.4-1.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3256</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256" source="CVE"/>
	<description>
	FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.
	</description>
 </metadata>
<!-- 614142ec1b08b316207851675a74c063 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072293" comment="freetype2-devel-32bit less than 2.3.12-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072294" comment="freetype2-devel less than 2.3.12-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072295" comment="libfreetype6-32bit less than 2.3.12-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072296" comment="libfreetype6 less than 2.3.12-7.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3266</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3266" source="CVE"/>
	<description>
	The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 877307b8185fd17546b7883de5fd0aff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071929" comment="wireshark-devel less than 1.4.10-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071930" comment="wireshark less than 1.4.10-0.7.1"/>
		</criteria>
	</criteria>
	<!-- a20b166da1111917ae5d5aa5dbf7ca99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070977" comment="wireshark-devel less than 1.4.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070963" comment="wireshark less than 1.4.4-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3268</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3268" source="CVE"/>
	<description>
	Buffer overflow in the crypt function in PHP before 5.3.7 allows context-dependent attackers to have an unspecified impact via a long salt argument, a different vulnerability than CVE-2011-2483.
	</description>
 </metadata>
<!-- 305cdf02c65b5f2bea22d190e09eea68 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070978" comment="apache2-mod_php5 less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070979" comment="php5-bcmath less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070980" comment="php5-bz2 less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070981" comment="php5-calendar less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070982" comment="php5-ctype less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070983" comment="php5-curl less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070984" comment="php5-dba less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070985" comment="php5-devel less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070986" comment="php5-dom less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070987" comment="php5-enchant less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070988" comment="php5-exif less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070989" comment="php5-fastcgi less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070990" comment="php5-fileinfo less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070991" comment="php5-ftp less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070992" comment="php5-gd less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070993" comment="php5-gettext less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070994" comment="php5-gmp less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070995" comment="php5-hash less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070996" comment="php5-iconv less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070997" comment="php5-imap less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070998" comment="php5-intl less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070999" comment="php5-json less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071000" comment="php5-ldap less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071001" comment="php5-mbstring less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071002" comment="php5-mcrypt less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071003" comment="php5-mysql less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071004" comment="php5-odbc less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071005" comment="php5-openssl less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071006" comment="php5-pcntl less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071007" comment="php5-pdo less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071008" comment="php5-pear less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071009" comment="php5-pgsql less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071010" comment="php5-phar less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071011" comment="php5-posix less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071012" comment="php5-pspell less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071013" comment="php5-readline less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071014" comment="php5-shmop less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071015" comment="php5-snmp less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071016" comment="php5-soap less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071017" comment="php5-sockets less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071018" comment="php5-sqlite less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071019" comment="php5-suhosin less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071020" comment="php5-sysvmsg less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071021" comment="php5-sysvsem less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071022" comment="php5-sysvshm less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071023" comment="php5-tidy less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071024" comment="php5-tokenizer less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071025" comment="php5-wddx less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071026" comment="php5-xmlreader less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071027" comment="php5-xmlrpc less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071028" comment="php5-xmlwriter less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071029" comment="php5-xsl less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071030" comment="php5-zip less than 5.3.3-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071031" comment="php5-zlib less than 5.3.3-0.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3323</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3323" source="CVE"/>
	<description>
	The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.
	</description>
 </metadata>
<!-- 939d0e40a4cd926622c96c2af4fb918f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071516" comment="quagga-devel less than 0.99.17-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071517" comment="quagga less than 0.99.17-1.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3324</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3324" source="CVE"/>
	<description>
	The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.
	</description>
 </metadata>
<!-- 939d0e40a4cd926622c96c2af4fb918f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071516" comment="quagga-devel less than 0.99.17-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071517" comment="quagga less than 0.99.17-1.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3325</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3325" source="CVE"/>
	<description>
	ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.
	</description>
 </metadata>
<!-- 939d0e40a4cd926622c96c2af4fb918f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071516" comment="quagga-devel less than 0.99.17-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071517" comment="quagga less than 0.99.17-1.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3326</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3326" source="CVE"/>
	<description>
	The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.
	</description>
 </metadata>
<!-- 939d0e40a4cd926622c96c2af4fb918f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071516" comment="quagga-devel less than 0.99.17-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071517" comment="quagga less than 0.99.17-1.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3327</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3327" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.
	</description>
 </metadata>
<!-- 939d0e40a4cd926622c96c2af4fb918f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071516" comment="quagga-devel less than 0.99.17-1.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071517" comment="quagga less than 0.99.17-1.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3348</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348" source="CVE"/>
	<description>
	The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.
	</description>
 </metadata>
<!-- f911943c9529ea49152e73793a879875 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071702" comment="apache2-devel less than 2.2.15-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071703" comment="apache2-doc less than 2.2.15-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071704" comment="apache2-example-certificates less than 2.2.15-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071705" comment="apache2-example-pages less than 2.2.15-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071706" comment="apache2-itk less than 2.2.15-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071707" comment="apache2-prefork less than 2.2.15-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071708" comment="apache2-utils less than 2.2.15-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071709" comment="apache2-worker less than 2.2.15-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071710" comment="apache2 less than 2.2.15-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3353</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3353" source="CVE"/>
	<description>
	Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem.
	</description>
 </metadata>
<!-- ebc337cc8b33a14657744237f336f151 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071733" comment="kernel-debug-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071734" comment="kernel-debug-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071735" comment="kernel-debug less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071736" comment="kernel-default-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071737" comment="kernel-default-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071738" comment="kernel-default less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071739" comment="kernel-desktop-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071740" comment="kernel-desktop-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071741" comment="kernel-desktop less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071742" comment="kernel-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071743" comment="kernel-ec2-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071744" comment="kernel-ec2-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071745" comment="kernel-ec2-extra less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071746" comment="kernel-ec2 less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071747" comment="kernel-pae-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071748" comment="kernel-pae-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071749" comment="kernel-pae less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071750" comment="kernel-source-vanilla less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071751" comment="kernel-source less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071752" comment="kernel-syms less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071753" comment="kernel-trace-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071754" comment="kernel-trace-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071755" comment="kernel-trace less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071756" comment="kernel-vanilla-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071757" comment="kernel-vanilla-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071758" comment="kernel-vanilla less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071759" comment="kernel-vmi-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071760" comment="kernel-vmi-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071761" comment="kernel-vmi less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071762" comment="kernel-xen-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071763" comment="kernel-xen-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071764" comment="kernel-xen less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071765" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.4-19.1.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071766" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.4-19.1.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3360</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3360" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.
	</description>
 </metadata>
<!-- a20b166da1111917ae5d5aa5dbf7ca99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070977" comment="wireshark-devel less than 1.4.4-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070963" comment="wireshark less than 1.4.4-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3363</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3363" source="CVE"/>
	<description>
	The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share.
	</description>
 </metadata>
<!-- ebc337cc8b33a14657744237f336f151 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071733" comment="kernel-debug-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071734" comment="kernel-debug-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071735" comment="kernel-debug less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071736" comment="kernel-default-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071737" comment="kernel-default-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071738" comment="kernel-default less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071739" comment="kernel-desktop-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071740" comment="kernel-desktop-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071741" comment="kernel-desktop less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071742" comment="kernel-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071743" comment="kernel-ec2-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071744" comment="kernel-ec2-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071745" comment="kernel-ec2-extra less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071746" comment="kernel-ec2 less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071747" comment="kernel-pae-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071748" comment="kernel-pae-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071749" comment="kernel-pae less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071750" comment="kernel-source-vanilla less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071751" comment="kernel-source less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071752" comment="kernel-syms less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071753" comment="kernel-trace-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071754" comment="kernel-trace-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071755" comment="kernel-trace less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071756" comment="kernel-vanilla-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071757" comment="kernel-vanilla-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071758" comment="kernel-vanilla less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071759" comment="kernel-vmi-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071760" comment="kernel-vmi-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071761" comment="kernel-vmi less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071762" comment="kernel-xen-base less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071763" comment="kernel-xen-devel less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071764" comment="kernel-xen less than 2.6.34.10-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071765" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.4-19.1.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071766" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.4-19.1.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3368</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368" source="CVE"/>
	<description>
	The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- c9363c7e5ef77a368b963f39058b18f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072166" comment="apache2-devel less than 2.2.15-4.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072167" comment="apache2-doc less than 2.2.15-4.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072168" comment="apache2-example-certificates less than 2.2.15-4.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072169" comment="apache2-example-pages less than 2.2.15-4.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072170" comment="apache2-itk less than 2.2.15-4.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072171" comment="apache2-prefork less than 2.2.15-4.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072172" comment="apache2-utils less than 2.2.15-4.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072173" comment="apache2-worker less than 2.2.15-4.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072174" comment="apache2 less than 2.2.15-4.9.1"/>
		</criteria>
	</criteria>
	<!-- f911943c9529ea49152e73793a879875 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071702" comment="apache2-devel less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071703" comment="apache2-doc less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071704" comment="apache2-example-certificates less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071705" comment="apache2-example-pages less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071706" comment="apache2-itk less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071707" comment="apache2-prefork less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071708" comment="apache2-utils less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071709" comment="apache2-worker less than 2.2.15-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071710" comment="apache2 less than 2.2.15-4.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3369</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3369" source="CVE"/>
	<description>
	The add_conversation function in conversations.c in EtherApe before 0.9.12 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RPC packet, related to the get_rpc function in decode_proto.c.
	</description>
 </metadata>
<!-- a9c24dc0690442b83393d73ecb581b16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071573" comment="etherape less than 0.9.12-2.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3372</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3372" source="CVE"/>
	<description>
	imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
	</description>
 </metadata>
<!-- 381c223b9d4acd10b51e8c79a006ad20 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071574" comment="cyrus-imapd-devel less than 2.3.16-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071575" comment="cyrus-imapd less than 2.3.16-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071576" comment="perl-Cyrus-IMAP less than 2.3.16-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071577" comment="perl-Cyrus-SIEVE-managesieve less than 2.3.16-8.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3377</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3377" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 7b7b46d499429792296c1ff337f83f82 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071917" comment="icedtea-web-javadoc less than 1.1.4-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071918" comment="icedtea-web less than 1.1.4-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3378</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378" source="CVE"/>
	<description>
	RPM 4.4.x through 4.9.x, probably before 4.9.1.2, allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via an rpm package with crafted headers and offsets that are not properly handled when a package is queried or installed, related to (1) the regionSwab function, (2) the headerLoad function, and (3) multiple functions in rpmio/rpmpgp.c.
	</description>
 </metadata>
<!-- bbd3a5786d560ce0981e6dc664e9b310 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071649" comment="rpm-32bit less than 4.8.0-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071650" comment="rpm-devel less than 4.8.0-5.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071651" comment="rpm less than 4.8.0-5.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3388</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3388" source="CVE"/>
	<description>
	Opera before 11.51 allows remote attackers to cause an insecure site to appear secure or trusted via unspecified actions related to Extended Validation and loading content from trusted sources in an unspecified sequence that causes the address field and page information dialog to contain security information based on the trusted site, instead of the insecure site.
	</description>
 </metadata>
<!-- 43fb8e5f9770f0226e9b4ad498687c60 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070505" comment="opera-gtk less than 11.51-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070506" comment="opera-kde4 less than 11.51-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070507" comment="opera less than 11.51-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3389</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389" source="CVE"/>
	<description>
	The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43fb8e5f9770f0226e9b4ad498687c60 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070505" comment="opera-gtk less than 11.51-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070506" comment="opera-kde4 less than 11.51-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070507" comment="opera less than 11.51-0.2.1"/>
		</criteria>
	</criteria>
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
	<!-- e5c8571ceab21aabfcc2de533c18efef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072303" comment="libfreebl3-32bit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072304" comment="libfreebl3 less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072305" comment="libsoftokn3-32bit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072306" comment="libsoftokn3 less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072307" comment="mozilla-nss-32bit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072308" comment="mozilla-nss-certs-32bit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072309" comment="mozilla-nss-certs less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072310" comment="mozilla-nss-devel less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072311" comment="mozilla-nss-sysinit-32bit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072312" comment="mozilla-nss-sysinit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072313" comment="mozilla-nss-tools less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072314" comment="mozilla-nss less than 3.13.1-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3439</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439" source="CVE"/>
	<description>
	FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.
	</description>
 </metadata>
<!-- 614142ec1b08b316207851675a74c063 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072293" comment="freetype2-devel-32bit less than 2.3.12-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072294" comment="freetype2-devel less than 2.3.12-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072295" comment="libfreetype6-32bit less than 2.3.12-7.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072296" comment="libfreetype6 less than 2.3.12-7.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3481</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3481" source="CVE"/>
	<description>
	The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
	</description>
 </metadata>
<!-- 381c223b9d4acd10b51e8c79a006ad20 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071574" comment="cyrus-imapd-devel less than 2.3.16-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071575" comment="cyrus-imapd less than 2.3.16-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071576" comment="perl-Cyrus-IMAP less than 2.3.16-8.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071577" comment="perl-Cyrus-SIEVE-managesieve less than 2.3.16-8.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3483</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3483" source="CVE"/>
	<description>
	Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability."
	</description>
 </metadata>
<!-- a20b166da1111917ae5d5aa5dbf7ca99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070977" comment="wireshark-devel less than 1.4.4-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070963" comment="wireshark less than 1.4.4-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3516</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3516" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3521</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3521" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3544</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3544" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3545</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3545" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3546</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3546" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3547</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3547" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3548</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3548" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3549</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3549" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3550</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3550" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3551</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3551" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3552</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3552" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3553</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3553" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3554</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3554" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3555</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3555" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, and 7 allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3556</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3556" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3557</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3557" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3558</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3558" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3560</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3560" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3561</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3561" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a14ee3461239bf35b89f967286a2f570 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071628" comment="java-1_6_0-openjdk-demo less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071629" comment="java-1_6_0-openjdk-devel less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071630" comment="java-1_6_0-openjdk-javadoc less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071631" comment="java-1_6_0-openjdk-src less than 1.6.0.0_b22.1.10.4-0.3.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071632" comment="java-1_6_0-openjdk less than 1.6.0.0_b22.1.10.4-0.3.2"/>
		</criteria>
	</criteria>
	<!-- b2e927a141edaaaec847ae9ed53b89fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071633" comment="java-1_6_0-sun-alsa less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071634" comment="java-1_6_0-sun-devel less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071635" comment="java-1_6_0-sun-jdbc less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071636" comment="java-1_6_0-sun-plugin less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071637" comment="java-1_6_0-sun-src less than 1.6.0.u29-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071638" comment="java-1_6_0-sun less than 1.6.0.u29-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3581</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3581" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing input that is longer than a specified length.
	</description>
 </metadata>
<!-- f865b46ef0215854baa46f51d268a323 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071539" comment="libldns-devel less than 1.5.1-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071540" comment="libldns1 less than 1.5.1-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3594</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594" source="CVE"/>
	<description>
	The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
	</description>
 </metadata>
<!-- 98c6c8dd428bf4816b658ca5377c41ca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072056" comment="finch-devel less than 2.7.9-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072057" comment="finch less than 2.7.9-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072058" comment="libpurple-devel less than 2.7.9-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072059" comment="libpurple-lang less than 2.7.9-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072060" comment="libpurple-meanwhile less than 2.7.9-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072061" comment="libpurple-mono less than 2.7.9-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072062" comment="libpurple-tcl less than 2.7.9-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072063" comment="libpurple less than 2.7.9-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072064" comment="pidgin-devel less than 2.7.9-1.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072065" comment="pidgin less than 2.7.9-1.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3601</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3601" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 49dddfaaeaa9af374a17b98d885c926a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071832" comment="radvd less than 1.3-6.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3602</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3602" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 49dddfaaeaa9af374a17b98d885c926a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071832" comment="radvd less than 1.3-6.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3603</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3603" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 49dddfaaeaa9af374a17b98d885c926a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071832" comment="radvd less than 1.3-6.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3604</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3604" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 49dddfaaeaa9af374a17b98d885c926a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071832" comment="radvd less than 1.3-6.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3605</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3605" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 49dddfaaeaa9af374a17b98d885c926a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071832" comment="radvd less than 1.3-6.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3607</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607" source="CVE"/>
	<description>
	Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- c9363c7e5ef77a368b963f39058b18f5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072166" comment="apache2-devel less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072167" comment="apache2-doc less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072168" comment="apache2-example-certificates less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072169" comment="apache2-example-pages less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072170" comment="apache2-itk less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072171" comment="apache2-prefork less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072172" comment="apache2-utils less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072173" comment="apache2-worker less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072174" comment="apache2 less than 2.2.15-4.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3627</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3627" source="CVE"/>
	<description>
	The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
	</description>
 </metadata>
<!-- 1ecbfb6c5c782f4c77e16118ce72073e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071578" comment="clamav-db less than 0.97.3-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071561" comment="clamav less than 0.97.3-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3635</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3635" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the theme_adium_append_message function in empathy-theme-adium.c in the Adium theme in libempathy-gtk in Empathy 3.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted alias (aka nickname).
	</description>
 </metadata>
<!-- def8efb001657c00c54be0d13d255ef3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071931" comment="empathy-lang less than 2.30.1-3.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071932" comment="empathy less than 2.30.1-3.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071933" comment="nautilus-sendto-plugin-empathy less than 2.30.1-3.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3640</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3640" source="CVE"/>
	<description>
	** DISPUTED ** Untrusted search path vulnerability in Mozilla Network Security Services (NSS), as used in Google Chrome before 17 on Windows and Mac OS X, might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory.  NOTE: the vendor's response was "Strange behavior, but we're not treating this as a security bug."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3e6df1bc7dca3f861d84f7a962978b16 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071833" comment="libfreebl3-32bit less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071834" comment="libfreebl3 less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071835" comment="libsoftokn3-32bit less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071836" comment="libsoftokn3 less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071837" comment="mozilla-nss-32bit less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071838" comment="mozilla-nss-certs-32bit less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071839" comment="mozilla-nss-certs less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071840" comment="mozilla-nss-devel less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071841" comment="mozilla-nss-sysinit-32bit less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071842" comment="mozilla-nss-sysinit less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071843" comment="mozilla-nss-tools less than 3.12.11-1.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071844" comment="mozilla-nss less than 3.12.11-1.7.1"/>
		</criteria>
	</criteria>
	<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
		</criteria>
	</criteria>
	<!-- e5c8571ceab21aabfcc2de533c18efef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072303" comment="libfreebl3-32bit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072304" comment="libfreebl3 less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072305" comment="libsoftokn3-32bit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072306" comment="libsoftokn3 less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072307" comment="mozilla-nss-32bit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072308" comment="mozilla-nss-certs-32bit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072309" comment="mozilla-nss-certs less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072310" comment="mozilla-nss-devel less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072311" comment="mozilla-nss-sysinit-32bit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072312" comment="mozilla-nss-sysinit less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072313" comment="mozilla-nss-tools less than 3.13.1-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072314" comment="mozilla-nss less than 3.13.1-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3647</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3647" source="CVE"/>
	<description>
	The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 565c89fda4633c41c518cda44ad6146b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071845" comment="MozillaFirefox-branding-openSUSE less than 3.5-17.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071846" comment="MozillaFirefox-branding-upstream less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071847" comment="MozillaFirefox-translations-common less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071848" comment="MozillaFirefox-translations-other less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071849" comment="MozillaFirefox less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071850" comment="MozillaThunderbird-devel less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071851" comment="MozillaThunderbird-translations-common less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071852" comment="MozillaThunderbird-translations-other less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071853" comment="MozillaThunderbird less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071854" comment="enigmail less than 1.1.2+3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071855" comment="mozilla-js192-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071856" comment="mozilla-js192 less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071857" comment="mozilla-xulrunner192-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071858" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071859" comment="mozilla-xulrunner192-devel less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071860" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071861" comment="mozilla-xulrunner192-gnome less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071862" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071863" comment="mozilla-xulrunner192-translations-common less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071864" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071865" comment="mozilla-xulrunner192-translations-other less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071866" comment="mozilla-xulrunner192 less than 1.9.2.24-0.2.1"/>
		</criteria>
	</criteria>
	<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3648</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3648" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 565c89fda4633c41c518cda44ad6146b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071845" comment="MozillaFirefox-branding-openSUSE less than 3.5-17.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071846" comment="MozillaFirefox-branding-upstream less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071847" comment="MozillaFirefox-translations-common less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071848" comment="MozillaFirefox-translations-other less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071849" comment="MozillaFirefox less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071850" comment="MozillaThunderbird-devel less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071851" comment="MozillaThunderbird-translations-common less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071852" comment="MozillaThunderbird-translations-other less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071853" comment="MozillaThunderbird less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071854" comment="enigmail less than 1.1.2+3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071855" comment="mozilla-js192-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071856" comment="mozilla-js192 less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071857" comment="mozilla-xulrunner192-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071858" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071859" comment="mozilla-xulrunner192-devel less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071860" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071861" comment="mozilla-xulrunner192-gnome less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071862" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071863" comment="mozilla-xulrunner192-translations-common less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071864" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071865" comment="mozilla-xulrunner192-translations-other less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071866" comment="mozilla-xulrunner192 less than 1.9.2.24-0.2.1"/>
		</criteria>
	</criteria>
	<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3649</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3649" source="CVE"/>
	<description>
	Mozilla Firefox 7.0 and Thunderbird 7.0, when the Direct2D (aka D2D) API is used on Windows in conjunction with the Azure graphics back-end, allow remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas.  NOTE: this issue exists because of a CVE-2011-2986 regression.
	</description>
 </metadata>
<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3650</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3650" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 565c89fda4633c41c518cda44ad6146b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071845" comment="MozillaFirefox-branding-openSUSE less than 3.5-17.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071846" comment="MozillaFirefox-branding-upstream less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071847" comment="MozillaFirefox-translations-common less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071848" comment="MozillaFirefox-translations-other less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071849" comment="MozillaFirefox less than 3.6.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071850" comment="MozillaThunderbird-devel less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071851" comment="MozillaThunderbird-translations-common less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071852" comment="MozillaThunderbird-translations-other less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071853" comment="MozillaThunderbird less than 3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071854" comment="enigmail less than 1.1.2+3.1.16-0.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071855" comment="mozilla-js192-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071856" comment="mozilla-js192 less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071857" comment="mozilla-xulrunner192-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071858" comment="mozilla-xulrunner192-buildsymbols less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071859" comment="mozilla-xulrunner192-devel less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071860" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071861" comment="mozilla-xulrunner192-gnome less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071862" comment="mozilla-xulrunner192-translations-common-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071863" comment="mozilla-xulrunner192-translations-common less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071864" comment="mozilla-xulrunner192-translations-other-32bit less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071865" comment="mozilla-xulrunner192-translations-other less than 1.9.2.24-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071866" comment="mozilla-xulrunner192 less than 1.9.2.24-0.2.1"/>
		</criteria>
	</criteria>
	<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3651</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3651" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 7.0 and Thunderbird 7.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3652</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3652" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3653</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3653" source="CVE"/>
	<description>
	Mozilla Firefox before 8.0 and Thunderbird before 8.0 on Mac OS X do not properly interact with the GPU memory behavior of a certain driver for Intel integrated GPUs, which allows remote attackers to bypass the Same Origin Policy and read image data via vectors related to WebGL textures.
	</description>
 </metadata>
<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3654</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3654" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly handle links from SVG mpath elements to non-SVG elements, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3655</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3655" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0 through 7.0 perform access control without checking for use of the NoWaiverWrapper wrapper, which allows remote attackers to gain privileges via a crafted web site.
	</description>
 </metadata>
<!-- a16aaa12c4f276fda4dbdce0f1690d69 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072043" comment="seamonkey-dom-inspector less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072044" comment="seamonkey-irc less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072045" comment="seamonkey-translations-common less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072046" comment="seamonkey-translations-other less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072047" comment="seamonkey-venkman less than 2.5-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072048" comment="seamonkey less than 2.5-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3658</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3658" source="CVE"/>
	<description>
	The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements.
	</description>
 </metadata>
<!-- b8f665acea1c6f3c2b96ca3db6aaa113 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072315" comment="seamonkey-dom-inspector less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072316" comment="seamonkey-irc less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072317" comment="seamonkey-translations-common less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072318" comment="seamonkey-translations-other less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072319" comment="seamonkey-venkman less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072320" comment="seamonkey less than 2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3660</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3660" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger a compartment mismatch associated with the nsDOMMessageEvent::GetData function, and unknown other vectors.
	</description>
 </metadata>
<!-- b8f665acea1c6f3c2b96ca3db6aaa113 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072315" comment="seamonkey-dom-inspector less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072316" comment="seamonkey-irc less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072317" comment="seamonkey-translations-common less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072318" comment="seamonkey-translations-other less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072319" comment="seamonkey-venkman less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072320" comment="seamonkey less than 2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3661</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3661" source="CVE"/>
	<description>
	YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
	</description>
 </metadata>
<!-- b8f665acea1c6f3c2b96ca3db6aaa113 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072315" comment="seamonkey-dom-inspector less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072316" comment="seamonkey-irc less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072317" comment="seamonkey-translations-common less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072318" comment="seamonkey-translations-other less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072319" comment="seamonkey-venkman less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072320" comment="seamonkey less than 2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3663</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3663" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to capture keystrokes entered on a web page, even when JavaScript is disabled, by using SVG animation accessKey events within that web page.
	</description>
 </metadata>
<!-- b8f665acea1c6f3c2b96ca3db6aaa113 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072315" comment="seamonkey-dom-inspector less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072316" comment="seamonkey-irc less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072317" comment="seamonkey-translations-common less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072318" comment="seamonkey-translations-other less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072319" comment="seamonkey-venkman less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072320" comment="seamonkey less than 2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3665</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3665" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an Ogg VIDEO element that is not properly handled after scaling.
	</description>
 </metadata>
<!-- b8f665acea1c6f3c2b96ca3db6aaa113 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072315" comment="seamonkey-dom-inspector less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072316" comment="seamonkey-irc less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072317" comment="seamonkey-translations-common less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072318" comment="seamonkey-translations-other less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072319" comment="seamonkey-venkman less than 2.6-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072320" comment="seamonkey less than 2.6-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3848</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3848" source="CVE"/>
	<description>
	Directory traversal vulnerability in Puppet 2.6.x before 2.6.10 and 2.7.x before 2.7.4 allows remote attackers to write X.509 Certificate Signing Request (CSR) to arbitrary locations via (1) a double-encoded key parameter in the URI in 2.7.x, (2) the CN in the Subject of a CSR in 2.6 and 0.25.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13df6b1ef76004cb9b919c9173b4b343 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071610" comment="puppet-server less than 0.25.4-4.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071611" comment="puppet less than 0.25.4-4.3.1"/>
		</criteria>
	</criteria>
	<!-- 7a93cfecf56f804800c470e621417813 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072030" comment="puppet-server less than 0.25.4-4.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072031" comment="puppet less than 0.25.4-4.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3869</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3869" source="CVE"/>
	<description>
	Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to overwrite arbitrary files via a symlink attack on the .k5login file.
	</description>
 </metadata>
<!-- 7a93cfecf56f804800c470e621417813 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072030" comment="puppet-server less than 0.25.4-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072031" comment="puppet less than 0.25.4-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3870</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3870" source="CVE"/>
	<description>
	Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x allows local users to modify the permissions of arbitrary files via a symlink attack on the SSH authorized_keys file.
	</description>
 </metadata>
<!-- 7a93cfecf56f804800c470e621417813 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072030" comment="puppet-server less than 0.25.4-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072031" comment="puppet less than 0.25.4-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3871</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3871" source="CVE"/>
	<description>
	Puppet 2.7.x before 2.7.5, 2.6.x before 2.6.11, and 0.25.x, when running in --edit mode, uses a predictable file name, which allows local users to run arbitrary Puppet code or trick a user into editing arbitrary files.
	</description>
 </metadata>
<!-- 7a93cfecf56f804800c470e621417813 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072030" comment="puppet-server less than 0.25.4-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072031" comment="puppet less than 0.25.4-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3872</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3872" source="CVE"/>
	<description>
	Puppet 2.6.x before 2.6.12 and 2.7.x before 2.7.6, and Puppet Enterprise (PE) Users 1.0, 1.1, and 1.2 before 1.2.4, when signing an agent certificate, adds the Puppet master's certdnsnames values to the X.509 Subject Alternative Name field of the certificate, which allows remote attackers to spoof a Puppet master via a man-in-the-middle (MITM) attack against an agent that uses an alternate DNS name for the master, aka "AltNames Vulnerability."
	</description>
 </metadata>
<!-- 7a93cfecf56f804800c470e621417813 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072030" comment="puppet-server less than 0.25.4-4.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072031" comment="puppet less than 0.25.4-4.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3919</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3919" source="CVE"/>
	<description>
	Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- 1349d7cd7e99b80850665c4781261d94 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072659" comment="libxml2-32bit less than 2.7.7-4.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072660" comment="libxml2-devel-32bit less than 2.7.7-4.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072661" comment="libxml2-devel less than 2.7.7-4.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072662" comment="libxml2-doc less than 2.7.7-4.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072663" comment="libxml2 less than 2.7.7-4.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3922</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-3922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3922" source="CVE"/>
	<description>
	Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to glyph handling.
	</description>
 </metadata>
<!-- 1cc694f08ff66dba5aa5b69fbd9584db -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072613" comment="libQtWebKit-devel less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072614" comment="libQtWebKit4-32bit less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072615" comment="libQtWebKit4 less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072616" comment="libqt4-32bit less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072617" comment="libqt4-devel less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072618" comment="libqt4-qt3support-32bit less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072619" comment="libqt4-qt3support less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072620" comment="libqt4-sql-32bit less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072621" comment="libqt4-sql-sqlite-32bit less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072622" comment="libqt4-sql-sqlite less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072623" comment="libqt4-sql less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072624" comment="libqt4-x11-32bit less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072625" comment="libqt4-x11 less than 4.6.3-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072626" comment="libqt4 less than 4.6.3-2.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4000</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4000" source="CVE"/>
	<description>
	Buffer overflow in ChaSen 2.4.x allows remote attackers to execute arbitrary code via a crafted string.
	</description>
 </metadata>
<!-- e24a9c7266a8fee6133ef3c166aab49c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072370" comment="chasen-devel less than 2.4.2-60.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072371" comment="chasen less than 2.4.2-60.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072372" comment="perl-Text-ChaSen less than 2.4.2-60.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4028</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4028" source="CVE"/>
	<description>
	The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to determine the existence of arbitrary files via a symlink attack on a temporary lock file, which is handled differently if the file exists.
	</description>
 </metadata>
<!-- 1604eac6aa69bc1ec1aca988656e2fa5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072066" comment="xorg-x11-Xvnc less than 7.5_1.8.0-10.15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072067" comment="xorg-x11-server-extra less than 7.5_1.8.0-10.15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072068" comment="xorg-x11-server-sdk less than 7.5_1.8.0-10.15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072069" comment="xorg-x11-server less than 7.5_1.8.0-10.15.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4029</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4029" source="CVE"/>
	<description>
	The LockServer function in os/utils.c in X.Org xserver before 1.11.2 allows local users to change the permissions of arbitrary files to 444, read those files, and possibly cause a denial of service (removed execution permission) via a symlink attack on a temporary lock file.
	</description>
 </metadata>
<!-- 1604eac6aa69bc1ec1aca988656e2fa5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072066" comment="xorg-x11-Xvnc less than 7.5_1.8.0-10.15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072067" comment="xorg-x11-server-extra less than 7.5_1.8.0-10.15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072068" comment="xorg-x11-server-sdk less than 7.5_1.8.0-10.15.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072069" comment="xorg-x11-server less than 7.5_1.8.0-10.15.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4081</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4081" source="CVE"/>
	<description>
	crypto/ghash-generic.c in the Linux kernel before 3.1 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact by triggering a failed or missing ghash_setkey function call, followed by a (1) ghash_update function call or (2) ghash_final function call, as demonstrated by a write operation on an AF_ALG socket.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4091</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4091" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 05ab252201c5da62275a04e3f597d009 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072373" comment="net6-devel less than 1.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072374" comment="net6-lang less than 1.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072375" comment="net6 less than 1.3.14-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4093</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4093" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 05ab252201c5da62275a04e3f597d009 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072373" comment="net6-devel less than 1.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072374" comment="net6-lang less than 1.3.14-0.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072375" comment="net6 less than 1.3.14-0.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4099</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4099" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 47841a7309c802f4ab0f130ae54a70a1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071934" comment="libcap-devel less than 2.16-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071935" comment="libcap-progs less than 2.16-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071936" comment="libcap2-32bit less than 2.16-10.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071937" comment="libcap2 less than 2.16-10.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4101</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4101" source="CVE"/>
	<description>
	The dissect_infiniband_common function in epan/dissectors/packet-infiniband.c in the Infiniband dissector in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 877307b8185fd17546b7883de5fd0aff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071929" comment="wireshark-devel less than 1.4.10-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071930" comment="wireshark less than 1.4.10-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4102</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4102" source="CVE"/>
	<description>
	Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (application crash) via a malformed file.
	</description>
 </metadata>
<!-- 877307b8185fd17546b7883de5fd0aff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071929" comment="wireshark-devel less than 1.4.10-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071930" comment="wireshark less than 1.4.10-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4108</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108" source="CVE"/>
	<description>
	The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
	</description>
 </metadata>
<!-- 8a1eb57dd92a52595b9400b6eb1c5245 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072495" comment="libopenssl-devel less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072496" comment="libopenssl1_0_0-32bit less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072497" comment="libopenssl1_0_0 less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072498" comment="openssl-doc less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072499" comment="openssl less than 1.0.0-6.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4182</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4182" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- d1e05c1530c24ed33ecdb60b53c0b76b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072664" comment="sysconfig less than 0.73.7-2.15.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4313</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313" source="CVE"/>
	<description>
	query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
	</description>
 </metadata>
<!-- 673940abcaf8bfa7f0ad4c6c3cdf9d7d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071999" comment="bind-chrootenv less than 9.7.4P1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072000" comment="bind-devel less than 9.7.4P1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072001" comment="bind-doc less than 9.7.4P1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072002" comment="bind-libs-32bit less than 9.7.4P1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072003" comment="bind-libs less than 9.7.4P1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072004" comment="bind-utils less than 9.7.4P1-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072005" comment="bind less than 9.7.4P1-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4317</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317" source="CVE"/>
	<description>
	The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
	</description>
 </metadata>
<!-- c9363c7e5ef77a368b963f39058b18f5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072166" comment="apache2-devel less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072167" comment="apache2-doc less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072168" comment="apache2-example-certificates less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072169" comment="apache2-example-pages less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072170" comment="apache2-itk less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072171" comment="apache2-prefork less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072172" comment="apache2-utils less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072173" comment="apache2-worker less than 2.2.15-4.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072174" comment="apache2 less than 2.2.15-4.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4345</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4345" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Namazu before 2.0.21, when Internet Explorer 6 or 7 is used, allows remote attackers to inject arbitrary web script or HTML via a cookie.
	</description>
 </metadata>
<!-- 141b90ee2771a7452b6339a94ac4879e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072259" comment="namazu-cgi less than 2.0.20-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072260" comment="namazu-devel less than 2.0.20-2.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072261" comment="namazu less than 2.0.20-2.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4369</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4369" source="CVE"/>
	<description>
	Unspecified vulnerability in the PRC component in Adobe Reader and Acrobat 9.x before 9.4.7 on Windows, Adobe Reader and Acrobat 9.x through 9.4.6 on Mac OS X, Adobe Reader and Acrobat 10.x through 10.1.1 on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
	</description>
 </metadata>
<!-- 7a28daed990f5f7affeae25da429f096 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072548" comment="acroread less than 9.4.7-0.3.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4405</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4405" source="CVE"/>
	<description>
	The cupshelpers scripts in system-config-printer in Ubuntu 11.04 and 11.10, as used by the automatic printer driver download service, uses an "insecure connection" for queries to the OpenPrinting database, which allows remote attackers to execute arbitrary code via a man-in-the-middle (MITM) attack that modifies packages or repositories.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6e4795fbccae0b5fa2ab50fc30e5706c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072266" comment="python-cupshelpers less than 1.2.0-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072267" comment="system-config-printer-lang less than 1.2.0-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072268" comment="system-config-printer less than 1.2.0-2.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072269" comment="udev-configure-printer less than 1.2.0-2.5.1"/>
		</criteria>
	</criteria>
	<!-- 83a0cbd0ebb1e92108cdb3fc5bbaba20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072482" comment="python-cupshelpers less than 1.2.0-2.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072483" comment="system-config-printer-lang less than 1.2.0-2.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072484" comment="system-config-printer less than 1.2.0-2.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072485" comment="udev-configure-printer less than 1.2.0-2.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4516</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516" source="CVE"/>
	<description>
	Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.
	</description>
 </metadata>
<!-- b2c9ffd3e6a9372f1454e5250d5482b2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072270" comment="jasper less than 1.900.1-141.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072271" comment="libjasper-32bit less than 1.900.1-141.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072272" comment="libjasper-devel less than 1.900.1-141.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072273" comment="libjasper less than 1.900.1-141.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4517</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517" source="CVE"/>
	<description>
	The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
	</description>
 </metadata>
<!-- b2c9ffd3e6a9372f1454e5250d5482b2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072270" comment="jasper less than 1.900.1-141.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072271" comment="libjasper-32bit less than 1.900.1-141.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072272" comment="libjasper-devel less than 1.900.1-141.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072273" comment="libjasper less than 1.900.1-141.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4539</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539" source="CVE"/>
	<description>
	dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
	</description>
 </metadata>
<!-- 521cc4d8757777f3e9cee0ca56f1ee56 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072227" comment="dhcp-client less than 4.1.2.ESV.1-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072228" comment="dhcp-devel less than 4.1.2.ESV.1-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072229" comment="dhcp-doc less than 4.1.2.ESV.1-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072230" comment="dhcp-relay less than 4.1.2.ESV.1-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072231" comment="dhcp-server less than 4.1.2.ESV.1-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072232" comment="dhcp less than 4.1.2.ESV.1-0.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4576</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576" source="CVE"/>
	<description>
	The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
	</description>
 </metadata>
<!-- 8a1eb57dd92a52595b9400b6eb1c5245 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072495" comment="libopenssl-devel less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072496" comment="libopenssl1_0_0-32bit less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072497" comment="libopenssl1_0_0 less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072498" comment="openssl-doc less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072499" comment="openssl less than 1.0.0-6.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4577</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4577" source="CVE"/>
	<description>
	OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
	</description>
 </metadata>
<!-- 8a1eb57dd92a52595b9400b6eb1c5245 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072495" comment="libopenssl-devel less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072496" comment="libopenssl1_0_0-32bit less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072497" comment="libopenssl1_0_0 less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072498" comment="openssl-doc less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072499" comment="openssl less than 1.0.0-6.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4599</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4599" source="CVE"/>
	<description>
	Stack-based buffer overflow in the _canonicalize function in common/uloc.c in International Components for Unicode (ICU) before 49.1 allows remote attackers to execute arbitrary code via a crafted locale ID that is not properly handled during variant canonicalization.
	</description>
 </metadata>
<!-- fe258b2539e751fdfaa114332260b7f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072650" comment="icu-data less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072651" comment="icu less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072652" comment="libicu-32bit less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072653" comment="libicu-devel-32bit less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072654" comment="libicu-devel less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072655" comment="libicu-doc less than 4.2-7.3.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072656" comment="libicu less than 4.2-7.3.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4601</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4601" source="CVE"/>
	<description>
	family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.
	</description>
 </metadata>
<!-- 56cdbc54c3179f1f38e10deb40f86ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072429" comment="finch-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072430" comment="finch less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072431" comment="libpurple-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072432" comment="libpurple-lang less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072433" comment="libpurple-meanwhile less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072434" comment="libpurple-mono less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072435" comment="libpurple-tcl less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072436" comment="libpurple less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072437" comment="pidgin-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072438" comment="pidgin less than 2.7.9-1.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4602</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4602" source="CVE"/>
	<description>
	The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.
	</description>
 </metadata>
<!-- 56cdbc54c3179f1f38e10deb40f86ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072429" comment="finch-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072430" comment="finch less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072431" comment="libpurple-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072432" comment="libpurple-lang less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072433" comment="libpurple-meanwhile less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072434" comment="libpurple-mono less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072435" comment="libpurple-tcl less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072436" comment="libpurple less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072437" comment="pidgin-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072438" comment="pidgin less than 2.7.9-1.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4603</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4603" source="CVE"/>
	<description>
	The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.
	</description>
 </metadata>
<!-- 56cdbc54c3179f1f38e10deb40f86ee2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072429" comment="finch-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072430" comment="finch less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072431" comment="libpurple-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072432" comment="libpurple-lang less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072433" comment="libpurple-meanwhile less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072434" comment="libpurple-mono less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072435" comment="libpurple-tcl less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072436" comment="libpurple less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072437" comment="pidgin-devel less than 2.7.9-1.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072438" comment="pidgin less than 2.7.9-1.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4604</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4604" source="CVE"/>
	<description>
	The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.
	</description>
 </metadata>
<!-- 2bed7091aa699baa46f25b381a1bed8f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072514" comment="kernel-debug-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072515" comment="kernel-debug-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072516" comment="kernel-debug less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072517" comment="kernel-default-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072518" comment="kernel-default-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072519" comment="kernel-default less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072520" comment="kernel-desktop-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072521" comment="kernel-desktop-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072522" comment="kernel-desktop less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072523" comment="kernel-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072524" comment="kernel-ec2-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072525" comment="kernel-ec2-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072526" comment="kernel-ec2-extra less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072527" comment="kernel-ec2 less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072528" comment="kernel-pae-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072529" comment="kernel-pae-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072530" comment="kernel-pae less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072531" comment="kernel-source-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072532" comment="kernel-source less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072533" comment="kernel-syms less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072534" comment="kernel-trace-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072535" comment="kernel-trace-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072536" comment="kernel-trace less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072537" comment="kernel-vanilla-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072538" comment="kernel-vanilla-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072539" comment="kernel-vanilla less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072540" comment="kernel-vmi-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072541" comment="kernel-vmi-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072542" comment="kernel-vmi less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072543" comment="kernel-xen-base less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072544" comment="kernel-xen-devel less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072545" comment="kernel-xen less than 2.6.34.10-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072546" comment="preload-kmp-default less than 1.1_k2.6.34.10_0.6-19.1.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072547" comment="preload-kmp-desktop less than 1.1_k2.6.34.10_0.6-19.1.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4619</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619" source="CVE"/>
	<description>
	The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
	</description>
 </metadata>
<!-- 8a1eb57dd92a52595b9400b6eb1c5245 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072495" comment="libopenssl-devel less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072496" comment="libopenssl1_0_0-32bit less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072497" comment="libopenssl1_0_0 less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072498" comment="openssl-doc less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072499" comment="openssl less than 1.0.0-6.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4681</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4681" source="CVE"/>
	<description>
	Opera before 11.60 does not properly consider the number of . (dot) characters that conventionally exist in domain names of different top-level domains, which allows remote attackers to bypass the Same Origin Policy by leveraging access to a different domain name in the same top-level domain, as demonstrated by the .no or .uk domain.
	</description>
 </metadata>
<!-- 14523f7d909b40cacfa1b2945264bfc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072189" comment="opera-gtk less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072190" comment="opera-kde4 less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072191" comment="opera less than 11.60-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4682</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4682" source="CVE"/>
	<description>
	The JavaScript engine in Opera before 11.60 does not properly implement the in operator, which allows remote attackers to bypass the Same Origin Policy via vectors related to variables on different web sites.
	</description>
 </metadata>
<!-- 14523f7d909b40cacfa1b2945264bfc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072189" comment="opera-gtk less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072190" comment="opera-kde4 less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072191" comment="opera less than 11.60-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4683</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4683" source="CVE"/>
	<description>
	Unspecified vulnerability in Opera before 11.60 has unknown impact and attack vectors, related to a "moderately severe issue."
	</description>
 </metadata>
<!-- 14523f7d909b40cacfa1b2945264bfc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072189" comment="opera-gtk less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072190" comment="opera-kde4 less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072191" comment="opera less than 11.60-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4684</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4684" source="CVE"/>
	<description>
	Opera before 11.60 does not properly handle certificate revocation, which has unspecified impact and remote attack vectors related to "corner cases."
	</description>
 </metadata>
<!-- 14523f7d909b40cacfa1b2945264bfc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072189" comment="opera-gtk less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072190" comment="opera-kde4 less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072191" comment="opera less than 11.60-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4685</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4685" source="CVE"/>
	<description>
	Dragonfly in Opera before 11.60 allows remote attackers to cause a denial of service (application crash) via unspecified content on a web page, as demonstrated by forbes.com.
	</description>
 </metadata>
<!-- 14523f7d909b40cacfa1b2945264bfc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072189" comment="opera-gtk less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072190" comment="opera-kde4 less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072191" comment="opera less than 11.60-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4686</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4686" source="CVE"/>
	<description>
	Unspecified vulnerability in the Web Workers implementation in Opera before 11.60 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
	</description>
 </metadata>
<!-- 14523f7d909b40cacfa1b2945264bfc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072189" comment="opera-gtk less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072190" comment="opera-kde4 less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072191" comment="opera less than 11.60-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4687</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4687" source="CVE"/>
	<description>
	Opera before 11.60 allows remote attackers to cause a denial of service (CPU and memory consumption) via unspecified content on a web page, as demonstrated by a page under the cisco.com home page.
	</description>
 </metadata>
<!-- 14523f7d909b40cacfa1b2945264bfc9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072189" comment="opera-gtk less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072190" comment="opera-kde4 less than 11.60-0.2.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072191" comment="opera less than 11.60-0.2.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4858</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4858" source="CVE"/>
	<description>
	Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
	</description>
 </metadata>
<!-- d3cc5bef84a76562f381127745d018b9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072665" comment="tomcat6-admin-webapps less than 6.0.24-5.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072666" comment="tomcat6-docs-webapp less than 6.0.24-5.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072667" comment="tomcat6-el-1_0-api less than 6.0.24-5.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072668" comment="tomcat6-javadoc less than 6.0.24-5.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072669" comment="tomcat6-jsp-2_1-api less than 6.0.24-5.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072670" comment="tomcat6-lib less than 6.0.24-5.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072671" comment="tomcat6-servlet-2_5-api less than 6.0.24-5.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072672" comment="tomcat6-webapps less than 6.0.24-5.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072673" comment="tomcat6 less than 6.0.24-5.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4862</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2011-4862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862" source="CVE"/>
	<description>
	Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
	</description>
 </metadata>
<!-- 52987cd5a9f6916dfa806c1c0b2327b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072352" comment="krb5-appl-clients less than 1.0-4.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072353" comment="krb5-appl-servers less than 1.0-4.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0027</title>
	<affected family="unix">
		<platform>openSUSE 11.3</platform>
	</affected>
	<reference ref_id="CVE-2012-0027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0027" source="CVE"/>
	<description>
	The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
	</description>
 </metadata>
<!-- 8a1eb57dd92a52595b9400b6eb1c5245 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009061661" comment="suse113 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072495" comment="libopenssl-devel less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072496" comment="libopenssl1_0_0-32bit less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072497" comment="libopenssl1_0_0 less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072498" comment="openssl-doc less than 1.0.0-6.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072499" comment="openssl less than 1.0.0-6.13.1"/>
	</criteria>
</criteria>
</definition>
 </definitions>
 <tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061661" version="1" comment="openSUSE-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070058" version="1" comment="hplip-hpijs is &lt;3.10.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070059" version="1" comment="hplip is &lt;3.10.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072291" version="1" comment="coreutils-lang is &lt;7.1-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072292" version="1" comment="coreutils is &lt;7.1-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071992" version="1" comment="NetworkManager-devel is &lt;0.8-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071993" version="1" comment="NetworkManager-doc is &lt;0.8-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071994" version="1" comment="NetworkManager-glib is &lt;0.8-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071995" version="1" comment="NetworkManager-gnome is &lt;0.8-6.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071996" version="1" comment="NetworkManager is &lt;0.8-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071997" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071998" version="1" comment="wpa_supplicant is &lt;0.7.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072648" version="1" comment="NetworkManager-gnome is &lt;0.8-6.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065205" version="1" comment="kdenetwork4-filesharing is &lt;4.4.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065206" version="1" comment="kdenetwork4 is &lt;4.4.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065207" version="1" comment="kdnssd is &lt;4.4.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065208" version="1" comment="kget is &lt;4.4.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065209" version="1" comment="kopete-devel is &lt;4.4.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065210" version="1" comment="kopete is &lt;4.4.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065211" version="1" comment="kppp is &lt;4.4.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065212" version="1" comment="krdc is &lt;4.4.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065213" version="1" comment="krfb is &lt;4.4.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069568" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-155.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069569" version="1" comment="compat-openssl097g is &lt;0.9.7g-155.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069815" version="1" comment="libpng12-0-32bit is &lt;1.2.46-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069816" version="1" comment="libpng12-0 is &lt;1.2.46-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069817" version="1" comment="libpng12-compat-devel is &lt;1.2.46-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069818" version="1" comment="libpng12-devel is &lt;1.2.46-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069819" version="1" comment="libpng14-14-32bit is &lt;1.4.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069820" version="1" comment="libpng14-14 is &lt;1.4.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069821" version="1" comment="libpng14-compat-devel is &lt;1.4.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069822" version="1" comment="libpng14-devel is &lt;1.4.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065482" version="1" comment="libwebkit-1_0-2-32bit is &lt;1.2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065483" version="1" comment="libwebkit-1_0-2 is &lt;1.2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065484" version="1" comment="libwebkit-devel is &lt;1.2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065485" version="1" comment="libwebkit-lang is &lt;1.2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065486" version="1" comment="webkit-jsc is &lt;1.2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064419" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b20.1.9.1-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064420" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b20.1.9.1-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064421" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b20.1.9.1-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064422" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.0.0_b20.1.9.1-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064423" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b20.1.9.1-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064424" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b20.1.9.1-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063824" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063826" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063827" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063828" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063829" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063830" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u22-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064838" version="1" comment="gnutls is &lt;2.8.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064839" version="1" comment="libgnutls-devel is &lt;2.8.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064840" version="1" comment="libgnutls-extra-devel is &lt;2.8.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064841" version="1" comment="libgnutls-extra26 is &lt;2.8.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064842" version="1" comment="libgnutls26-32bit is &lt;2.8.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064843" version="1" comment="libgnutls26 is &lt;2.8.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065294" version="1" comment="gnutls is &lt;2.8.6-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065295" version="1" comment="libgnutls-devel is &lt;2.8.6-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065296" version="1" comment="libgnutls-extra-devel is &lt;2.8.6-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065297" version="1" comment="libgnutls-extra26 is &lt;2.8.6-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065298" version="1" comment="libgnutls26-32bit is &lt;2.8.6-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065299" version="1" comment="libgnutls26 is &lt;2.8.6-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061909" version="1" comment="squidGuard-doc is &lt;1.4-7.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061910" version="1" comment="squidGuard is &lt;1.4-7.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069634" version="1" comment="libsndfile-32bit is &lt;1.0.20-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069635" version="1" comment="libsndfile-devel is &lt;1.0.20-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069636" version="1" comment="libsndfile is &lt;1.0.20-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061979" version="1" comment="libpcsclite1-32bit is &lt;1.5.5-7.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061980" version="1" comment="libpcsclite1 is &lt;1.5.5-7.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061981" version="1" comment="pcsc-lite-devel is &lt;1.5.5-7.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061982" version="1" comment="pcsc-lite is &lt;1.5.5-7.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067965" version="1" comment="libtiff-devel-32bit is &lt;3.9.2-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067966" version="1" comment="libtiff-devel is &lt;3.9.2-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067967" version="1" comment="libtiff3-32bit is &lt;3.9.2-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067968" version="1" comment="libtiff3 is &lt;3.9.2-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067969" version="1" comment="tiff is &lt;3.9.2-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071562" version="1" comment="fail2ban is &lt;0.8.4-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068545" version="1" comment="viewvc is &lt;1.1.11-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072403" version="1" comment="glibc-32bit is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072404" version="1" comment="glibc-devel-32bit is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072405" version="1" comment="glibc-devel is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072406" version="1" comment="glibc-html is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072407" version="1" comment="glibc-i18ndata is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072408" version="1" comment="glibc-info is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072409" version="1" comment="glibc-locale-32bit is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072410" version="1" comment="glibc-locale is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072411" version="1" comment="glibc-obsolete is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072412" version="1" comment="glibc-profile-32bit is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072413" version="1" comment="glibc-profile is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072414" version="1" comment="glibc is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072415" version="1" comment="nscd is &lt;2.11.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067027" version="1" comment="python-feedparser is &lt;4.1-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065080" version="1" comment="MozillaThunderbird-devel is &lt;3.0.11-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065081" version="1" comment="MozillaThunderbird-translations-common is &lt;3.0.11-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065082" version="1" comment="MozillaThunderbird-translations-other is &lt;3.0.11-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065083" version="1" comment="MozillaThunderbird is &lt;3.0.11-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065102" version="1" comment="enigmail is &lt;1.0.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065226" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065227" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065228" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065229" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065230" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065231" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065232" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065233" version="1" comment="python-xpcom191 is &lt;1.9.1.16-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065234" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065235" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065236" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065237" version="1" comment="MozillaFirefox is &lt;3.6.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065238" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065239" version="1" comment="mozilla-js192 is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065240" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065241" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065242" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065243" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065244" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065245" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065246" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065247" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065248" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065249" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065085" version="1" comment="seamonkey-dom-inspector is &lt;2.0.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065086" version="1" comment="seamonkey-irc is &lt;2.0.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065103" version="1" comment="seamonkey-translations-common is &lt;2.0.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065104" version="1" comment="seamonkey-translations-other is &lt;2.0.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065087" version="1" comment="seamonkey-venkman is &lt;2.0.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065088" version="1" comment="seamonkey is &lt;2.0.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061978" version="1" comment="flash-player is &lt;10.1.82.76-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062178" version="1" comment="acroread is &lt;9.3.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064075" version="1" comment="bind-chrootenv is &lt;9.7.1P2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064076" version="1" comment="bind-devel is &lt;9.7.1P2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064077" version="1" comment="bind-doc is &lt;9.7.1P2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064078" version="1" comment="bind-libs-32bit is &lt;9.7.1P2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064079" version="1" comment="bind-libs is &lt;9.7.1P2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064080" version="1" comment="bind-utils is &lt;9.7.1P2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064081" version="1" comment="bind is &lt;9.7.1P2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062504" version="1" comment="apache2-mod_php5 is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062505" version="1" comment="php5-bcmath is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062506" version="1" comment="php5-bz2 is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062507" version="1" comment="php5-calendar is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062508" version="1" comment="php5-ctype is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062509" version="1" comment="php5-curl is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062510" version="1" comment="php5-dba is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062511" version="1" comment="php5-devel is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062512" version="1" comment="php5-dom is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062513" version="1" comment="php5-enchant is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062514" version="1" comment="php5-exif is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062515" version="1" comment="php5-fastcgi is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062516" version="1" comment="php5-fileinfo is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062517" version="1" comment="php5-ftp is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062518" version="1" comment="php5-gd is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062519" version="1" comment="php5-gettext is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062520" version="1" comment="php5-gmp is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062521" version="1" comment="php5-hash is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062522" version="1" comment="php5-iconv is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062523" version="1" comment="php5-imap is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062524" version="1" comment="php5-intl is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062525" version="1" comment="php5-json is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062526" version="1" comment="php5-ldap is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062527" version="1" comment="php5-mbstring is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062528" version="1" comment="php5-mcrypt is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062529" version="1" comment="php5-mysql is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062530" version="1" comment="php5-odbc is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062531" version="1" comment="php5-openssl is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062532" version="1" comment="php5-pcntl is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062533" version="1" comment="php5-pdo is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062534" version="1" comment="php5-pear is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062535" version="1" comment="php5-pgsql is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062536" version="1" comment="php5-phar is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062537" version="1" comment="php5-posix is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062538" version="1" comment="php5-pspell is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062539" version="1" comment="php5-readline is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062540" version="1" comment="php5-shmop is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062541" version="1" comment="php5-snmp is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062542" version="1" comment="php5-soap is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062543" version="1" comment="php5-sockets is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062544" version="1" comment="php5-sqlite is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062545" version="1" comment="php5-suhosin is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062546" version="1" comment="php5-sysvmsg is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062547" version="1" comment="php5-sysvsem is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062548" version="1" comment="php5-sysvshm is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062549" version="1" comment="php5-tidy is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062550" version="1" comment="php5-tokenizer is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062551" version="1" comment="php5-wddx is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062552" version="1" comment="php5-xmlreader is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062553" version="1" comment="php5-xmlrpc is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062554" version="1" comment="php5-xmlwriter is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062555" version="1" comment="php5-xsl is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062556" version="1" comment="php5-zip is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062557" version="1" comment="php5-zlib is &lt;5.3.3-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063217" version="1" comment="bzip2-doc is &lt;1.0.5-39.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063218" version="1" comment="bzip2 is &lt;1.0.5-39.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063219" version="1" comment="libbz2-1-32bit is &lt;1.0.5-39.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063220" version="1" comment="libbz2-1 is &lt;1.0.5-39.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063221" version="1" comment="libbz2-devel is &lt;1.0.5-39.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065366" version="1" comment="kernel-debug-base is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065367" version="1" comment="kernel-debug-devel is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065368" version="1" comment="kernel-debug is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065369" version="1" comment="kernel-default-base is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065370" version="1" comment="kernel-default-devel is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065371" version="1" comment="kernel-default is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065372" version="1" comment="kernel-desktop-base is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065373" version="1" comment="kernel-desktop-devel is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065374" version="1" comment="kernel-desktop is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065375" version="1" comment="kernel-devel is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065376" version="1" comment="kernel-ec2-base is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065377" version="1" comment="kernel-ec2-devel is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065378" version="1" comment="kernel-ec2-extra is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065379" version="1" comment="kernel-ec2 is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065380" version="1" comment="kernel-pae-base is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065381" version="1" comment="kernel-pae-devel is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065382" version="1" comment="kernel-pae is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065383" version="1" comment="kernel-source-vanilla is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065384" version="1" comment="kernel-source is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065385" version="1" comment="kernel-syms is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065386" version="1" comment="kernel-trace-base is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065387" version="1" comment="kernel-trace-devel is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065388" version="1" comment="kernel-trace is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065389" version="1" comment="kernel-vanilla-base is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065390" version="1" comment="kernel-vanilla-devel is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065391" version="1" comment="kernel-vanilla is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065392" version="1" comment="kernel-vmi-base is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065393" version="1" comment="kernel-vmi-devel is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065394" version="1" comment="kernel-vmi is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065395" version="1" comment="kernel-xen-base is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065396" version="1" comment="kernel-xen-devel is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065397" version="1" comment="kernel-xen is &lt;2.6.34.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065398" version="1" comment="preload-kmp-default is &lt;1.1_k2.6.34.7_0.7-19.1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065399" version="1" comment="preload-kmp-desktop is &lt;1.1_k2.6.34.7_0.7-19.1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068621" version="1" comment="ruby-devel is &lt;1.8.7.p249-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068622" version="1" comment="ruby-doc-html is &lt;1.8.7.p249-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068623" version="1" comment="ruby-doc-ri is &lt;1.8.7.p249-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068624" version="1" comment="ruby-examples is &lt;1.8.7.p249-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068625" version="1" comment="ruby-test-suite is &lt;1.8.7.p249-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068626" version="1" comment="ruby-tk is &lt;1.8.7.p249-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068627" version="1" comment="ruby is &lt;1.8.7.p249-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064799" version="1" comment="cups-client is &lt;1.4.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064800" version="1" comment="cups-ddk is &lt;1.4.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064801" version="1" comment="cups-devel is &lt;1.4.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064802" version="1" comment="cups-libs-32bit is &lt;1.4.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064803" version="1" comment="cups-libs is &lt;1.4.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064804" version="1" comment="cups is &lt;1.4.4-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072649" version="1" comment="squid is &lt;2.7.STABLE6-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061279" version="1" comment="opera is &lt;10.60-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061823" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061824" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061825" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061826" version="1" comment="MozillaFirefox is &lt;3.6.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061827" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061828" version="1" comment="mozilla-js192 is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061829" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061830" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061831" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061832" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061833" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061834" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061835" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061836" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061837" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061838" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061810" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061818" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061819" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061811" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061820" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061821" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061814" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061822" version="1" comment="python-xpcom191 is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061794" version="1" comment="seamonkey-dom-inspector is &lt;2.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061795" version="1" comment="seamonkey-irc is &lt;2.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061803" version="1" comment="seamonkey-translations-common is &lt;2.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061804" version="1" comment="seamonkey-translations-other is &lt;2.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061796" version="1" comment="seamonkey-venkman is &lt;2.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061797" version="1" comment="seamonkey is &lt;2.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061798" version="1" comment="MozillaThunderbird-devel is &lt;3.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061799" version="1" comment="MozillaThunderbird-translations-common is &lt;3.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061800" version="1" comment="MozillaThunderbird-translations-other is &lt;3.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061801" version="1" comment="MozillaThunderbird is &lt;3.0.6-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061805" version="1" comment="enigmail is &lt;1.0.1-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062558" version="1" comment="iscsitarget-kmp-default is &lt;1.4.19_k2.6.34.0_12-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062559" version="1" comment="iscsitarget-kmp-desktop is &lt;1.4.19_k2.6.34.0_12-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062560" version="1" comment="iscsitarget-kmp-pae is &lt;1.4.19_k2.6.34.0_12-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062561" version="1" comment="iscsitarget-kmp-xen is &lt;1.4.19_k2.6.34.0_12-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062562" version="1" comment="iscsitarget is &lt;1.4.19-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062563" version="1" comment="tgt is &lt;0.9.0-7.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062664" version="1" comment="tomcat6-admin-webapps is &lt;6.0.24-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062665" version="1" comment="tomcat6-docs-webapp is &lt;6.0.24-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062666" version="1" comment="tomcat6-el-1_0-api is &lt;6.0.24-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062667" version="1" comment="tomcat6-javadoc is &lt;6.0.24-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062668" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.24-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062669" version="1" comment="tomcat6-lib is &lt;6.0.24-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062670" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.24-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062671" version="1" comment="tomcat6-webapps is &lt;6.0.24-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062672" version="1" comment="tomcat6 is &lt;6.0.24-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065550" version="1" comment="sudo is &lt;1.7.2p7-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062179" version="1" comment="xorg-x11-Xvnc is &lt;7.5_1.8.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062180" version="1" comment="xorg-x11-server-extra is &lt;7.5_1.8.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062181" version="1" comment="xorg-x11-server-sdk is &lt;7.5_1.8.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062182" version="1" comment="xorg-x11-server is &lt;7.5_1.8.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067028" version="1" comment="NetworkManager-devel is &lt;0.8-8.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067029" version="1" comment="NetworkManager-doc is &lt;0.8-8.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067030" version="1" comment="NetworkManager-glib is &lt;0.8-8.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067031" version="1" comment="NetworkManager is &lt;0.8-8.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064445" version="1" comment="gdm-branding-upstream is &lt;2.30.2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064446" version="1" comment="gdm-lang is &lt;2.30.2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064447" version="1" comment="gdm is &lt;2.30.2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064448" version="1" comment="gnome-applets-gdm is &lt;2.30.2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066963" version="1" comment="dbus-1-glib-32bit is &lt;0.86-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066964" version="1" comment="dbus-1-glib-devel is &lt;0.86-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066965" version="1" comment="dbus-1-glib-doc is &lt;0.86-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066966" version="1" comment="dbus-1-glib is &lt;0.86-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063406" version="1" comment="krb5-32bit is &lt;1.8.1-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063407" version="1" comment="krb5-client is &lt;1.8.1-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063408" version="1" comment="krb5-devel-32bit is &lt;1.8.1-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063409" version="1" comment="krb5-devel is &lt;1.8.1-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063410" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.1-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063411" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.1-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063412" version="1" comment="krb5-server is &lt;1.8.1-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063413" version="1" comment="krb5 is &lt;1.8.1-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065105" version="1" comment="krb5-32bit is &lt;1.8.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065106" version="1" comment="krb5-client is &lt;1.8.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065107" version="1" comment="krb5-devel-32bit is &lt;1.8.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065108" version="1" comment="krb5-devel is &lt;1.8.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065109" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065110" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065111" version="1" comment="krb5-server is &lt;1.8.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065112" version="1" comment="krb5 is &lt;1.8.1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061911" version="1" comment="libwebkit-1_0-2-32bit is &lt;1.2.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061912" version="1" comment="libwebkit-1_0-2 is &lt;1.2.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061913" version="1" comment="libwebkit-devel is &lt;1.2.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061914" version="1" comment="libwebkit-lang is &lt;1.2.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061915" version="1" comment="webkit-jsc is &lt;1.2.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065487" version="1" comment="wireshark-devel is &lt;1.4.2-1.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065488" version="1" comment="wireshark is &lt;1.4.2-1.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063150" version="1" comment="libgdiplus0 is &lt;2.6.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066074" version="1" comment="seamonkey-dom-inspector is &lt;2.0.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066075" version="1" comment="seamonkey-irc is &lt;2.0.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066104" version="1" comment="seamonkey-translations-common is &lt;2.0.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066105" version="1" comment="seamonkey-translations-other is &lt;2.0.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066076" version="1" comment="seamonkey-venkman is &lt;2.0.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066077" version="1" comment="seamonkey is &lt;2.0.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066078" version="1" comment="MozillaThunderbird-devel is &lt;3.1.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066079" version="1" comment="MozillaThunderbird-translations-common is &lt;3.1.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066080" version="1" comment="MozillaThunderbird-translations-other is &lt;3.1.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066081" version="1" comment="MozillaThunderbird is &lt;3.1.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066082" version="1" comment="enigmail is &lt;1.1.2-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066106" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066107" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066108" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066068" version="1" comment="MozillaFirefox is &lt;3.6.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066109" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066110" version="1" comment="mozilla-js192 is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066069" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066111" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066112" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066113" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066070" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066114" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066115" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066116" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066117" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066073" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066062" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066099" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066100" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066063" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066101" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066102" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066066" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066103" version="1" comment="python-xpcom191 is &lt;1.9.1.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069596" version="1" comment="apache2-devel is &lt;2.2.15-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069597" version="1" comment="apache2-doc is &lt;2.2.15-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069598" version="1" comment="apache2-example-certificates is &lt;2.2.15-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069599" version="1" comment="apache2-example-pages is &lt;2.2.15-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069600" version="1" comment="apache2-itk is &lt;2.2.15-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069601" version="1" comment="apache2-prefork is &lt;2.2.15-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069602" version="1" comment="apache2-utils is &lt;2.2.15-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069603" version="1" comment="apache2-worker is &lt;2.2.15-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069604" version="1" comment="apache2 is &lt;2.2.15-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069605" version="1" comment="libapr-util1-dbd-mysql is &lt;1.3.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069606" version="1" comment="libapr-util1-dbd-pgsql is &lt;1.3.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069607" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069608" version="1" comment="libapr-util1-devel is &lt;1.3.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069609" version="1" comment="libapr-util1 is &lt;1.3.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069610" version="1" comment="libapr1-devel is &lt;1.3.8-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069611" version="1" comment="libapr1 is &lt;1.3.8-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066773" version="1" comment="quagga-devel is &lt;0.99.17-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066774" version="1" comment="quagga is &lt;0.99.17-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063153" version="1" comment="libwebkit-1_0-2-32bit is &lt;1.2.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063154" version="1" comment="libwebkit-1_0-2 is &lt;1.2.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063155" version="1" comment="libwebkit-devel is &lt;1.2.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063156" version="1" comment="libwebkit-lang is &lt;1.2.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063157" version="1" comment="webkit-jsc is &lt;1.2.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062092" version="1" comment="libfreetype6-32bit is &lt;2.3.12-7.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062093" version="1" comment="libfreetype6 is &lt;2.3.12-7.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061762" version="1" comment="exim is &lt;4.71-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061763" version="1" comment="eximon is &lt;4.71-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061764" version="1" comment="eximstats-html is &lt;4.71-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061916" version="1" comment="ghostscript-devel is &lt;8.70-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061917" version="1" comment="ghostscript-fonts-other is &lt;8.70-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061918" version="1" comment="ghostscript-fonts-rus is &lt;8.70-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061919" version="1" comment="ghostscript-fonts-std is &lt;8.70-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061920" version="1" comment="ghostscript-ijs-devel is &lt;8.70-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061921" version="1" comment="ghostscript-library is &lt;8.70-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061922" version="1" comment="ghostscript-omni is &lt;8.70-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061923" version="1" comment="ghostscript-x11 is &lt;8.70-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061924" version="1" comment="libgimpprint-devel is &lt;4.2.7-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061925" version="1" comment="libgimpprint is &lt;4.2.7-15.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061662" version="1" comment="tiff is &lt;3.9.2-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065175" version="1" comment="otrs-doc is &lt;2.4.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065176" version="1" comment="otrs-itsm is &lt;2.1.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065177" version="1" comment="otrs is &lt;2.4.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062673" version="1" comment="libvirt-client is &lt;0.8.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062674" version="1" comment="libvirt-devel is &lt;0.8.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062675" version="1" comment="libvirt-doc is &lt;0.8.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062676" version="1" comment="libvirt-python is &lt;0.8.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062677" version="1" comment="libvirt is &lt;0.8.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068428" version="1" comment="libwebkit-1_0-2-32bit is &lt;1.2.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068429" version="1" comment="libwebkit-1_0-2 is &lt;1.2.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068430" version="1" comment="libwebkit-devel is &lt;1.2.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068431" version="1" comment="libwebkit-lang is &lt;1.2.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068432" version="1" comment="webkit-jsc is &lt;1.2.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061663" version="1" comment="python-mako is &lt;0.2.5-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062228" version="1" comment="kernel-debug-base is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062229" version="1" comment="kernel-debug-devel is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062230" version="1" comment="kernel-debug is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062231" version="1" comment="kernel-default-base is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062232" version="1" comment="kernel-default-devel is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062233" version="1" comment="kernel-default is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062234" version="1" comment="kernel-desktop-base is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062235" version="1" comment="kernel-desktop-devel is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062236" version="1" comment="kernel-desktop is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062237" version="1" comment="kernel-devel is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062238" version="1" comment="kernel-ec2-devel is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062239" version="1" comment="kernel-pae-base is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062240" version="1" comment="kernel-pae-devel is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062241" version="1" comment="kernel-pae is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062242" version="1" comment="kernel-source-vanilla is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062243" version="1" comment="kernel-source is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062244" version="1" comment="kernel-syms is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062245" version="1" comment="kernel-trace-base is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062246" version="1" comment="kernel-trace-devel is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062247" version="1" comment="kernel-trace is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062248" version="1" comment="kernel-vanilla-base is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062249" version="1" comment="kernel-vanilla-devel is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062250" version="1" comment="kernel-vanilla is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062251" version="1" comment="kernel-vmi-devel is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062252" version="1" comment="kernel-xen-base is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062253" version="1" comment="kernel-xen-devel is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062254" version="1" comment="kernel-xen is &lt;2.6.34.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062255" version="1" comment="preload-kmp-default is &lt;1.1_k2.6.34.4_0.1-19.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062256" version="1" comment="preload-kmp-desktop is &lt;1.1_k2.6.34.4_0.1-19.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063776" version="1" comment="mipv6d is &lt;2.0.2-8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061778" version="1" comment="lxsession is &lt;0.4.4-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065797" version="1" comment="git-arch is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065798" version="1" comment="git-core is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065799" version="1" comment="git-cvs is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065800" version="1" comment="git-daemon is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065801" version="1" comment="git-email is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065802" version="1" comment="git-gui is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065803" version="1" comment="git-remote-helpers is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065804" version="1" comment="git-svn is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065805" version="1" comment="git-web is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065806" version="1" comment="git is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065807" version="1" comment="gitk is &lt;1.7.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061958" version="1" comment="gpg2-lang is &lt;2.0.15-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061959" version="1" comment="gpg2 is &lt;2.0.15-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062148" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b18-1.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062149" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b18-1.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062150" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b18-1.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062151" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.0.0_b18-1.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062152" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b18-1.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062153" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b18-1.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063269" version="1" comment="gwenview is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063270" version="1" comment="kcolorchooser is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063271" version="1" comment="kdegraphics4 is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063272" version="1" comment="kgamma is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063273" version="1" comment="kio_kamera is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063274" version="1" comment="kolourpaint is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063275" version="1" comment="kruler is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063276" version="1" comment="ksnapshot is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063277" version="1" comment="libkdcraw-devel is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063278" version="1" comment="libkdcraw8 is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063279" version="1" comment="libkexiv2-8 is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063280" version="1" comment="libkexiv2-devel is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063281" version="1" comment="libkipi-devel is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063282" version="1" comment="libkipi7 is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063283" version="1" comment="libksane-devel is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063284" version="1" comment="libksane0 is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063285" version="1" comment="okular-devel is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063286" version="1" comment="okular is &lt;4.4.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062048" version="1" comment="opera is &lt;10.61-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061967" version="1" comment="strongswan-doc is &lt;4.4.0-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061968" version="1" comment="strongswan-ikev1 is &lt;4.4.0-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061969" version="1" comment="strongswan-ikev2 is &lt;4.4.0-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061970" version="1" comment="strongswan-ipsec is &lt;4.4.0-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061971" version="1" comment="strongswan-libs0 is &lt;4.4.0-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061972" version="1" comment="strongswan-nm is &lt;4.4.0-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061973" version="1" comment="strongswan is &lt;4.4.0-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065545" version="1" comment="evince-devel is &lt;2.30.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065546" version="1" comment="evince-lang is &lt;2.30.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065547" version="1" comment="evince is &lt;2.30.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065548" version="1" comment="nautilus-evince is &lt;2.30.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065870" version="1" comment="t1lib-devel is &lt;5.1.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065871" version="1" comment="t1lib is &lt;5.1.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061713" version="1" comment="vte-devel is &lt;0.24.1-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061714" version="1" comment="vte-lang is &lt;0.24.1-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061715" version="1" comment="vte is &lt;0.24.1-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063897" version="1" comment="seamonkey-dom-inspector is &lt;2.0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063898" version="1" comment="seamonkey-irc is &lt;2.0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063925" version="1" comment="seamonkey-translations-common is &lt;2.0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063926" version="1" comment="seamonkey-translations-other is &lt;2.0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063899" version="1" comment="seamonkey-venkman is &lt;2.0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063900" version="1" comment="seamonkey is &lt;2.0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063393" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063394" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063395" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063396" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063397" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063398" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063399" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063400" version="1" comment="python-xpcom191 is &lt;1.9.1.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063414" version="1" comment="MozillaThunderbird-devel is &lt;3.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063415" version="1" comment="MozillaThunderbird-translations-common is &lt;3.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063416" version="1" comment="MozillaThunderbird-translations-other is &lt;3.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063417" version="1" comment="MozillaThunderbird is &lt;3.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063418" version="1" comment="enigmail is &lt;1.0.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062744" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062745" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062746" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062747" version="1" comment="MozillaFirefox is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062748" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062749" version="1" comment="mozilla-js192 is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062750" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062751" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062752" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062753" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062754" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062755" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062756" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062757" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062758" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062759" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064096" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064097" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064098" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064099" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064100" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064101" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064102" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064103" version="1" comment="python-xpcom191 is &lt;1.9.1.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063927" version="1" comment="MozillaThunderbird-devel is &lt;3.0.9-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063928" version="1" comment="MozillaThunderbird-translations-common is &lt;3.0.9-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063929" version="1" comment="MozillaThunderbird-translations-other is &lt;3.0.9-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063930" version="1" comment="MozillaThunderbird is &lt;3.0.9-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063931" version="1" comment="enigmail is &lt;1.0.1-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062760" version="1" comment="seamonkey-dom-inspector is &lt;2.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062761" version="1" comment="seamonkey-irc is &lt;2.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062770" version="1" comment="seamonkey-translations-common is &lt;2.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062771" version="1" comment="seamonkey-translations-other is &lt;2.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062762" version="1" comment="seamonkey-venkman is &lt;2.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062763" version="1" comment="seamonkey is &lt;2.0.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065599" version="1" comment="perl-32bit is &lt;5.12.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065600" version="1" comment="perl-base-32bit is &lt;5.12.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065601" version="1" comment="perl-base is &lt;5.12.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065602" version="1" comment="perl-doc is &lt;5.12.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065603" version="1" comment="perl is &lt;5.12.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065466" version="1" comment="perl-CGI-Simple is &lt;1.112-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061926" version="1" comment="kvirc-devel is &lt;3.4.2-10.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061927" version="1" comment="kvirc is &lt;3.4.2-10.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062772" version="1" comment="kernel-debug-base is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062773" version="1" comment="kernel-debug-devel is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062774" version="1" comment="kernel-debug is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062775" version="1" comment="kernel-default-base is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062776" version="1" comment="kernel-default-devel is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062777" version="1" comment="kernel-default is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062778" version="1" comment="kernel-desktop-base is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062779" version="1" comment="kernel-desktop-devel is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062780" version="1" comment="kernel-desktop is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062781" version="1" comment="kernel-devel is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062782" version="1" comment="kernel-ec2-base is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062783" version="1" comment="kernel-ec2-devel is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062784" version="1" comment="kernel-ec2-extra is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062785" version="1" comment="kernel-ec2 is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062786" version="1" comment="kernel-pae-base is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062787" version="1" comment="kernel-pae-devel is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062788" version="1" comment="kernel-pae is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062789" version="1" comment="kernel-source-vanilla is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062790" version="1" comment="kernel-source is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062791" version="1" comment="kernel-syms is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062792" version="1" comment="kernel-trace-base is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062793" version="1" comment="kernel-trace-devel is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062794" version="1" comment="kernel-trace is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062795" version="1" comment="kernel-vanilla-base is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062796" version="1" comment="kernel-vanilla-devel is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062797" version="1" comment="kernel-vanilla is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062798" version="1" comment="kernel-vmi-base is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062799" version="1" comment="kernel-vmi-devel is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062800" version="1" comment="kernel-vmi is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062801" version="1" comment="kernel-xen-base is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062802" version="1" comment="kernel-xen-devel is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062803" version="1" comment="kernel-xen is &lt;2.6.34.7-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062804" version="1" comment="preload-kmp-default is &lt;1.1_k2.6.34.7_0.2-19.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062805" version="1" comment="preload-kmp-desktop is &lt;1.1_k2.6.34.7_0.2-19.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063368" version="1" comment="acroread is &lt;9.4-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062813" version="1" comment="flash-player is &lt;10.1.85.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065400" version="1" comment="libsmi-devel is &lt;0.4.5-131.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065401" version="1" comment="libsmi is &lt;0.4.5-131.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067303" version="1" comment="OpenOffice_org is &lt;3.3.1.2.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067605" version="1" comment="aspell-de is &lt;20091006-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067606" version="1" comment="igerman98-doc is &lt;20091006-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067607" version="1" comment="ispell-naustrian is &lt;20091006-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067608" version="1" comment="ispell-ngerman is &lt;20091006-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067609" version="1" comment="ispell-nswiss is &lt;20091006-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067304" version="1" comment="libreoffice-artwork-devel is &lt;3.3.1.2-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067305" version="1" comment="libreoffice-base-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067306" version="1" comment="libreoffice-base-drivers-mysql is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067307" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067308" version="1" comment="libreoffice-base-extensions is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067309" version="1" comment="libreoffice-base-l10n-prebuilt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067310" version="1" comment="libreoffice-base is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067311" version="1" comment="libreoffice-bootstrap is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067312" version="1" comment="libreoffice-branding-openSUSE is &lt;3.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067313" version="1" comment="libreoffice-branding-upstream is &lt;3.3.1.2-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067314" version="1" comment="libreoffice-calc-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067315" version="1" comment="libreoffice-calc-extensions is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067316" version="1" comment="libreoffice-calc-l10n-prebuilt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067317" version="1" comment="libreoffice-calc is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067318" version="1" comment="libreoffice-components-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067319" version="1" comment="libreoffice-components-l10n-prebuilt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067320" version="1" comment="libreoffice-components is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067321" version="1" comment="libreoffice-converter is &lt;3.3-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067322" version="1" comment="libreoffice-draw-extensions is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067323" version="1" comment="libreoffice-draw is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067324" version="1" comment="libreoffice-filters-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067325" version="1" comment="libreoffice-filters-l10n-prebuilt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067326" version="1" comment="libreoffice-filters-optional is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067327" version="1" comment="libreoffice-filters is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067328" version="1" comment="libreoffice-gnome is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067329" version="1" comment="libreoffice-help-ar is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067330" version="1" comment="libreoffice-help-cs is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067331" version="1" comment="libreoffice-help-da is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067332" version="1" comment="libreoffice-help-de is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067333" version="1" comment="libreoffice-help-en-GB is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067334" version="1" comment="libreoffice-help-en-US-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067335" version="1" comment="libreoffice-help-en-US is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067336" version="1" comment="libreoffice-help-en-ZA is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067337" version="1" comment="libreoffice-help-es is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067338" version="1" comment="libreoffice-help-et is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067339" version="1" comment="libreoffice-help-fr is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067340" version="1" comment="libreoffice-help-gl is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067341" version="1" comment="libreoffice-help-gu-IN is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067342" version="1" comment="libreoffice-help-hi-IN is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067343" version="1" comment="libreoffice-help-hu is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067344" version="1" comment="libreoffice-help-it is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067345" version="1" comment="libreoffice-help-ja is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067346" version="1" comment="libreoffice-help-km is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067347" version="1" comment="libreoffice-help-ko is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067348" version="1" comment="libreoffice-help-nl is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067349" version="1" comment="libreoffice-help-pa-IN is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067350" version="1" comment="libreoffice-help-pl is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067351" version="1" comment="libreoffice-help-pt-BR is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067352" version="1" comment="libreoffice-help-pt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067353" version="1" comment="libreoffice-help-ru is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067354" version="1" comment="libreoffice-help-sl is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067355" version="1" comment="libreoffice-help-sv is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067356" version="1" comment="libreoffice-help-zh-CN is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067357" version="1" comment="libreoffice-help-zh-TW is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067358" version="1" comment="libreoffice-hyphen is &lt;20110203.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067610" version="1" comment="libreoffice-icon-theme-crystal is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067611" version="1" comment="libreoffice-icon-theme-galaxy is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067612" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067613" version="1" comment="libreoffice-icon-theme-oxygen is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067614" version="1" comment="libreoffice-icon-theme-tango is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067364" version="1" comment="libreoffice-icon-themes-prebuilt is &lt;3.3.1.2-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067365" version="1" comment="libreoffice-impress-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067366" version="1" comment="libreoffice-impress-extensions is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067367" version="1" comment="libreoffice-impress-l10n-prebuilt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067368" version="1" comment="libreoffice-impress is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067369" version="1" comment="libreoffice-kde4 is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067370" version="1" comment="libreoffice-kde is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067371" version="1" comment="libreoffice-l10n-af is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067372" version="1" comment="libreoffice-l10n-ar is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067373" version="1" comment="libreoffice-l10n-be-BY is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067374" version="1" comment="libreoffice-l10n-bg is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067375" version="1" comment="libreoffice-l10n-br is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067376" version="1" comment="libreoffice-l10n-ca is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067377" version="1" comment="libreoffice-l10n-cs is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067378" version="1" comment="libreoffice-l10n-cy is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067379" version="1" comment="libreoffice-l10n-da is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067380" version="1" comment="libreoffice-l10n-de is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067381" version="1" comment="libreoffice-l10n-el is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067382" version="1" comment="libreoffice-l10n-en-GB is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067383" version="1" comment="libreoffice-l10n-en-ZA is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067384" version="1" comment="libreoffice-l10n-es is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067385" version="1" comment="libreoffice-l10n-et is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067386" version="1" comment="libreoffice-l10n-extras-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067387" version="1" comment="libreoffice-l10n-extras-prebuilt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067388" version="1" comment="libreoffice-l10n-extras is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067389" version="1" comment="libreoffice-l10n-fi is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067390" version="1" comment="libreoffice-l10n-fr is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067391" version="1" comment="libreoffice-l10n-ga is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067392" version="1" comment="libreoffice-l10n-gl is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067393" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067394" version="1" comment="libreoffice-l10n-he is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067395" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067396" version="1" comment="libreoffice-l10n-hr is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067397" version="1" comment="libreoffice-l10n-hu is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067398" version="1" comment="libreoffice-l10n-it is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067399" version="1" comment="libreoffice-l10n-ja is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067400" version="1" comment="libreoffice-l10n-ka is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067401" version="1" comment="libreoffice-l10n-km is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067402" version="1" comment="libreoffice-l10n-ko is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067403" version="1" comment="libreoffice-l10n-lt is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067404" version="1" comment="libreoffice-l10n-mk is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067405" version="1" comment="libreoffice-l10n-nb is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067406" version="1" comment="libreoffice-l10n-nl is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067407" version="1" comment="libreoffice-l10n-nn is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067408" version="1" comment="libreoffice-l10n-nr is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067409" version="1" comment="libreoffice-l10n-pa-IN is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067410" version="1" comment="libreoffice-l10n-pl is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067411" version="1" comment="libreoffice-l10n-prebuilt is &lt;3.3.1.2-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067412" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067413" version="1" comment="libreoffice-l10n-pt is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067414" version="1" comment="libreoffice-l10n-ru is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067415" version="1" comment="libreoffice-l10n-rw is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067416" version="1" comment="libreoffice-l10n-sh is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067417" version="1" comment="libreoffice-l10n-sk is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067418" version="1" comment="libreoffice-l10n-sl is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067419" version="1" comment="libreoffice-l10n-sr is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067420" version="1" comment="libreoffice-l10n-ss is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067421" version="1" comment="libreoffice-l10n-st is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067422" version="1" comment="libreoffice-l10n-sv is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067423" version="1" comment="libreoffice-l10n-tg is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067424" version="1" comment="libreoffice-l10n-th is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067425" version="1" comment="libreoffice-l10n-tr is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067426" version="1" comment="libreoffice-l10n-ts is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067427" version="1" comment="libreoffice-l10n-uk is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067428" version="1" comment="libreoffice-l10n-ve is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067429" version="1" comment="libreoffice-l10n-vi is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067430" version="1" comment="libreoffice-l10n-xh is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067431" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067432" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067433" version="1" comment="libreoffice-l10n-zu is &lt;3.3.1.2-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067434" version="1" comment="libreoffice-languagetool-ca is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067435" version="1" comment="libreoffice-languagetool-de is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067436" version="1" comment="libreoffice-languagetool-en is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067437" version="1" comment="libreoffice-languagetool-es is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067438" version="1" comment="libreoffice-languagetool-fr is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067439" version="1" comment="libreoffice-languagetool-gl is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067440" version="1" comment="libreoffice-languagetool-it is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067441" version="1" comment="libreoffice-languagetool-nl is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067442" version="1" comment="libreoffice-languagetool-pl is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067443" version="1" comment="libreoffice-languagetool-ro is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067444" version="1" comment="libreoffice-languagetool-ru is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067445" version="1" comment="libreoffice-languagetool-sk is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067446" version="1" comment="libreoffice-languagetool-sv is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067447" version="1" comment="libreoffice-languagetool is &lt;1.2-7.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067448" version="1" comment="libreoffice-libs-core-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067449" version="1" comment="libreoffice-libs-core-l10n-prebuilt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067450" version="1" comment="libreoffice-libs-core is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067451" version="1" comment="libreoffice-libs-extern-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067452" version="1" comment="libreoffice-libs-extern-l10n-prebuilt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067453" version="1" comment="libreoffice-libs-extern is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067454" version="1" comment="libreoffice-libs-gui-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067455" version="1" comment="libreoffice-libs-gui-l10n-prebuilt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067456" version="1" comment="libreoffice-libs-gui is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067457" version="1" comment="libreoffice-mailmerge is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067458" version="1" comment="libreoffice-math is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067459" version="1" comment="libreoffice-mono is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067460" version="1" comment="libreoffice-officebean is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067461" version="1" comment="libreoffice-openclipart is &lt;3.3-1.12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067462" version="1" comment="libreoffice-pyuno is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067463" version="1" comment="libreoffice-templates-de is &lt;3.3-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067464" version="1" comment="libreoffice-templates-en is &lt;3.3-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066310" version="1" comment="libreoffice-templates-labels-a4 is &lt;1.0.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066311" version="1" comment="libreoffice-templates-labels-letter is &lt;1.0.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067465" version="1" comment="libreoffice-templates-presentation-layouts is &lt;3.3-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067466" version="1" comment="libreoffice-templates-ru is &lt;3.3-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067467" version="1" comment="libreoffice-testing is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067468" version="1" comment="libreoffice-testtool is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067469" version="1" comment="libreoffice-thesaurus-bg is &lt;20071210.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067470" version="1" comment="libreoffice-thesaurus-ca is &lt;1.5.0.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067471" version="1" comment="libreoffice-thesaurus-cs is &lt;20070913.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067472" version="1" comment="libreoffice-thesaurus-da is &lt;20100126.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067473" version="1" comment="libreoffice-thesaurus-de-AT is &lt;20100307.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067474" version="1" comment="libreoffice-thesaurus-de-CH is &lt;20100307.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067475" version="1" comment="libreoffice-thesaurus-de is &lt;20100307.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067476" version="1" comment="libreoffice-thesaurus-el is &lt;20061203.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067477" version="1" comment="libreoffice-thesaurus-en-AU is &lt;20081215.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067478" version="1" comment="libreoffice-thesaurus-en-GB is &lt;20051128.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067479" version="1" comment="libreoffice-thesaurus-en-US is &lt;20060111.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067480" version="1" comment="libreoffice-thesaurus-es-AR is &lt;0.1.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067481" version="1" comment="libreoffice-thesaurus-es-VE is &lt;1.0.1.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067482" version="1" comment="libreoffice-thesaurus-es is &lt;20050720.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067483" version="1" comment="libreoffice-thesaurus-fr is &lt;20100125.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067484" version="1" comment="libreoffice-thesaurus-ga is &lt;20071002.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067485" version="1" comment="libreoffice-thesaurus-hu is &lt;20080319.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067486" version="1" comment="libreoffice-thesaurus-it is &lt;20081129.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067487" version="1" comment="libreoffice-thesaurus-nb is &lt;20080310.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067488" version="1" comment="libreoffice-thesaurus-ne is &lt;1.1.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067489" version="1" comment="libreoffice-thesaurus-pl is &lt;20081206.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067490" version="1" comment="libreoffice-thesaurus-pt is &lt;20091015.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067491" version="1" comment="libreoffice-thesaurus-ro is &lt;20091130.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067492" version="1" comment="libreoffice-thesaurus-ru is &lt;20081013.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067493" version="1" comment="libreoffice-thesaurus-sk is &lt;20100208.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067494" version="1" comment="libreoffice-thesaurus-sl is &lt;20080601.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067495" version="1" comment="libreoffice-thesaurus-sv is &lt;20090624.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067496" version="1" comment="libreoffice-ure-devel-doc is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067497" version="1" comment="libreoffice-ure-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067498" version="1" comment="libreoffice-ure is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067499" version="1" comment="libreoffice-voikko is &lt;3.1.2-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067500" version="1" comment="libreoffice-writer-devel is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067501" version="1" comment="libreoffice-writer-extensions is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067502" version="1" comment="libreoffice-writer-l10n-prebuilt is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067503" version="1" comment="libreoffice-writer is &lt;3.3.1.2-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067504" version="1" comment="libreoffice is &lt;3.3.1.2-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067615" version="1" comment="myspell-african is &lt;20080701-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067616" version="1" comment="myspell-albanian is &lt;1.6.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067617" version="1" comment="myspell-american is &lt;20100316-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067618" version="1" comment="myspell-arabic is &lt;20080110-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067619" version="1" comment="myspell-assamese is &lt;1.0.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067620" version="1" comment="myspell-asturian is &lt;0.0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067621" version="1" comment="myspell-australian is &lt;20100316-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067622" version="1" comment="myspell-austrian is &lt;20091006-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067623" version="1" comment="myspell-belarusian is &lt;1.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067624" version="1" comment="myspell-bengali is &lt;20080201-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067625" version="1" comment="myspell-brazilian is &lt;20100111-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067626" version="1" comment="myspell-breton is &lt;0.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067627" version="1" comment="myspell-british is &lt;20100316-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067628" version="1" comment="myspell-bulgarian is &lt;4.1.5-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067629" version="1" comment="myspell-canadian is &lt;20100316-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067630" version="1" comment="myspell-catalan is &lt;2.1.5-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067631" version="1" comment="myspell-chichewa is &lt;0.01-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067632" version="1" comment="myspell-croatian is &lt;20080813-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067633" version="1" comment="myspell-czech is &lt;20080822-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067634" version="1" comment="myspell-danish is &lt;20090925-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067635" version="1" comment="myspell-dutch is &lt;20091002-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067636" version="1" comment="myspell-esperanto is &lt;1.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067637" version="1" comment="myspell-estonian is &lt;1.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067638" version="1" comment="myspell-faroese is &lt;20070816-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067639" version="1" comment="myspell-french is &lt;20100125-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067640" version="1" comment="myspell-gaelic-scots is &lt;1.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067641" version="1" comment="myspell-galician is &lt;20080515-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067642" version="1" comment="myspell-german is &lt;20091006-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067643" version="1" comment="myspell-greek is &lt;20041220-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067644" version="1" comment="myspell-gujarati is &lt;20061015-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067645" version="1" comment="myspell-haitian is &lt;0.06-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067646" version="1" comment="myspell-hebrew is &lt;20080914-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067647" version="1" comment="myspell-hindi is &lt;20090617-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067648" version="1" comment="myspell-hungarian is &lt;20100329-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067649" version="1" comment="myspell-icelandic is &lt;20090823-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067650" version="1" comment="myspell-indonese is &lt;1.2-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067651" version="1" comment="myspell-irish is &lt;20080805-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067652" version="1" comment="myspell-italian is &lt;20081129-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067653" version="1" comment="myspell-khmer is &lt;1.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067654" version="1" comment="myspell-kichwa is &lt;0.4-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067655" version="1" comment="myspell-kikuyu is &lt;20091010-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067656" version="1" comment="myspell-kinyarwanda is &lt;20090218-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067657" version="1" comment="myspell-kiswahili is &lt;20040516-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067658" version="1" comment="myspell-kurdish is &lt;0.96.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067659" version="1" comment="myspell-latvian is &lt;20100419-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067660" version="1" comment="myspell-lithuanian is &lt;20081204-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067661" version="1" comment="myspell-macedonian is &lt;20051126-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067662" version="1" comment="myspell-maithili is &lt;20100107-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067663" version="1" comment="myspell-malagasy is &lt;0.03-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067664" version="1" comment="myspell-malay is &lt;20090808-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067665" version="1" comment="myspell-malayalam is &lt;1.1.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067666" version="1" comment="myspell-maory is &lt;20080630-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067667" version="1" comment="myspell-marathi is &lt;20091210-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067668" version="1" comment="myspell-mexican is &lt;20091103-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067669" version="1" comment="myspell-ndebele is &lt;20091030-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067670" version="1" comment="myspell-new-zealand is &lt;20081204-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067671" version="1" comment="myspell-norsk-bokmaal is &lt;20080310-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067672" version="1" comment="myspell-norsk-nynorsk is &lt;20080310-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067673" version="1" comment="myspell-nswiss is &lt;20091006-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067674" version="1" comment="myspell-occitan-lengadocian is &lt;0.6.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067675" version="1" comment="myspell-persian is &lt;20070815-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067676" version="1" comment="myspell-polish is &lt;20081206-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067677" version="1" comment="myspell-portuguese is &lt;20091015-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067678" version="1" comment="myspell-romanian is &lt;20091130-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067679" version="1" comment="myspell-russian is &lt;20081013-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067680" version="1" comment="myspell-setswana is &lt;20061023-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067681" version="1" comment="myspell-slovak is &lt;20100208-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067682" version="1" comment="myspell-slovene is &lt;20091130-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067683" version="1" comment="myspell-sotho-northern is &lt;20060123-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067684" version="1" comment="myspell-south-african-english is &lt;20100316-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067685" version="1" comment="myspell-spanish-argentine is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067686" version="1" comment="myspell-spanish-bolivian is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067687" version="1" comment="myspell-spanish-chilean is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067688" version="1" comment="myspell-spanish-colombian is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067689" version="1" comment="myspell-spanish-costa-rican is &lt;0.4-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067690" version="1" comment="myspell-spanish-dominican is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067691" version="1" comment="myspell-spanish-ecuadorian is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067692" version="1" comment="myspell-spanish-guatemalan is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067693" version="1" comment="myspell-spanish-honduran is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067694" version="1" comment="myspell-spanish-nicaraguan is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067695" version="1" comment="myspell-spanish-panamanian is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067696" version="1" comment="myspell-spanish-paraguayan is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067697" version="1" comment="myspell-spanish-peruvian is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067698" version="1" comment="myspell-spanish-puerto-rican is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067699" version="1" comment="myspell-spanish-salvadorean is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067700" version="1" comment="myspell-spanish-uruguayan is &lt;0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067701" version="1" comment="myspell-spanish-venezuelan is &lt;1.0.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067702" version="1" comment="myspell-spanish is &lt;20051029-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067703" version="1" comment="myspell-swati is &lt;20091030-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067704" version="1" comment="myspell-swedish-finland is &lt;20100131-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067705" version="1" comment="myspell-swedish is &lt;20100130-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067706" version="1" comment="myspell-tagalog is &lt;0.02-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067707" version="1" comment="myspell-thai is &lt;0.3-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067708" version="1" comment="myspell-tsonga is &lt;20060123-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067709" version="1" comment="myspell-ukrainian is &lt;20090818-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067710" version="1" comment="myspell-venda is &lt;20091030-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067711" version="1" comment="myspell-vietnamese is &lt;20091031-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067712" version="1" comment="myspell-welsh is &lt;20040425-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067713" version="1" comment="myspell-xhosa is &lt;20091030-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067714" version="1" comment="myspell-zulu is &lt;20091210-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063514" version="1" comment="OpenOffice_org-draw is &lt;3.2.1.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063515" version="1" comment="OpenOffice_org-impress-devel is &lt;3.2.1.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063516" version="1" comment="OpenOffice_org-impress-l10n-prebuilt is &lt;3.2.1.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063517" version="1" comment="OpenOffice_org-impress is &lt;3.2.1.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063518" version="1" comment="OpenOffice_org-libs-gui-devel is &lt;3.2.1.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063519" version="1" comment="OpenOffice_org-libs-gui-l10n-prebuilt is &lt;3.2.1.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063520" version="1" comment="OpenOffice_org-libs-gui is &lt;3.2.1.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064313" version="1" comment="libopenssl-devel is &lt;1.0.0-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064314" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8m-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064315" version="1" comment="libopenssl0_9_8 is &lt;0.9.8m-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064316" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.0-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064317" version="1" comment="libopenssl1_0_0 is &lt;1.0.0-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064318" version="1" comment="openssl-doc is &lt;1.0.0-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064319" version="1" comment="openssl is &lt;1.0.0-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063460" version="1" comment="libHX22-32bit is &lt;3.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063461" version="1" comment="libHX22 is &lt;3.4-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064509" version="1" comment="quagga-devel is &lt;0.99.17-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064510" version="1" comment="quagga is &lt;0.99.17-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062955" version="1" comment="kernel-debug-base is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062956" version="1" comment="kernel-debug-devel is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062957" version="1" comment="kernel-debug is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062958" version="1" comment="kernel-default-base is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062959" version="1" comment="kernel-default-devel is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062960" version="1" comment="kernel-default is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062961" version="1" comment="kernel-desktop-base is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062962" version="1" comment="kernel-desktop-devel is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062963" version="1" comment="kernel-desktop is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062964" version="1" comment="kernel-devel is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062965" version="1" comment="kernel-ec2-base is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062966" version="1" comment="kernel-ec2-devel is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062967" version="1" comment="kernel-ec2-extra is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062968" version="1" comment="kernel-ec2 is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062969" version="1" comment="kernel-pae-base is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062970" version="1" comment="kernel-pae-devel is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062971" version="1" comment="kernel-pae is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062972" version="1" comment="kernel-source-vanilla is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062973" version="1" comment="kernel-source is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062974" version="1" comment="kernel-syms is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062975" version="1" comment="kernel-trace-base is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062976" version="1" comment="kernel-trace-devel is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062977" version="1" comment="kernel-trace is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062978" version="1" comment="kernel-vanilla-base is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062979" version="1" comment="kernel-vanilla-devel is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062980" version="1" comment="kernel-vanilla is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062981" version="1" comment="kernel-vmi-base is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062982" version="1" comment="kernel-vmi-devel is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062983" version="1" comment="kernel-vmi is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062984" version="1" comment="kernel-xen-base is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062985" version="1" comment="kernel-xen-devel is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062986" version="1" comment="kernel-xen is &lt;2.6.34.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062987" version="1" comment="preload-kmp-default is &lt;1.1_k2.6.34.7_0.3-19.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062988" version="1" comment="preload-kmp-desktop is &lt;1.1_k2.6.34.7_0.3-19.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062257" version="1" comment="sudo is &lt;1.7.2p7-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063521" version="1" comment="kernel-debug-base is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063522" version="1" comment="kernel-debug-devel is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063523" version="1" comment="kernel-debug is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063524" version="1" comment="kernel-default-base is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063525" version="1" comment="kernel-default-devel is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063526" version="1" comment="kernel-default is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063527" version="1" comment="kernel-desktop-base is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063528" version="1" comment="kernel-desktop-devel is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063529" version="1" comment="kernel-desktop is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063530" version="1" comment="kernel-devel is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063531" version="1" comment="kernel-ec2-base is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063532" version="1" comment="kernel-ec2-devel is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063533" version="1" comment="kernel-ec2-extra is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063534" version="1" comment="kernel-ec2 is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063535" version="1" comment="kernel-pae-base is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063536" version="1" comment="kernel-pae-devel is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063537" version="1" comment="kernel-pae is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063538" version="1" comment="kernel-source-vanilla is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063539" version="1" comment="kernel-source is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063540" version="1" comment="kernel-syms is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063541" version="1" comment="kernel-trace-base is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063542" version="1" comment="kernel-trace-devel is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063543" version="1" comment="kernel-trace is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063544" version="1" comment="kernel-vanilla-base is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063545" version="1" comment="kernel-vanilla-devel is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063546" version="1" comment="kernel-vanilla is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063547" version="1" comment="kernel-vmi-base is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063548" version="1" comment="kernel-vmi-devel is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063549" version="1" comment="kernel-vmi is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063550" version="1" comment="kernel-xen-base is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063551" version="1" comment="kernel-xen-devel is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063552" version="1" comment="kernel-xen is &lt;2.6.34.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063553" version="1" comment="preload-kmp-default is &lt;1.1_k2.6.34.7_0.4-19.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063554" version="1" comment="preload-kmp-desktop is &lt;1.1_k2.6.34.7_0.4-19.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063932" version="1" comment="kernel-debug-base is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063933" version="1" comment="kernel-debug-devel is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063934" version="1" comment="kernel-debug is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063935" version="1" comment="kernel-default-base is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063936" version="1" comment="kernel-default-devel is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063937" version="1" comment="kernel-default is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063938" version="1" comment="kernel-desktop-base is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063939" version="1" comment="kernel-desktop-devel is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063940" version="1" comment="kernel-desktop is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063941" version="1" comment="kernel-devel is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063942" version="1" comment="kernel-ec2-base is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063943" version="1" comment="kernel-ec2-devel is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063944" version="1" comment="kernel-ec2-extra is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063945" version="1" comment="kernel-ec2 is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063946" version="1" comment="kernel-pae-base is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063947" version="1" comment="kernel-pae-devel is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063948" version="1" comment="kernel-pae is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063949" version="1" comment="kernel-source-vanilla is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063950" version="1" comment="kernel-source is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063951" version="1" comment="kernel-syms is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063952" version="1" comment="kernel-trace-base is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063953" version="1" comment="kernel-trace-devel is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063954" version="1" comment="kernel-trace is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063955" version="1" comment="kernel-vanilla-base is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063956" version="1" comment="kernel-vanilla-devel is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063957" version="1" comment="kernel-vanilla is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063958" version="1" comment="kernel-vmi-base is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063959" version="1" comment="kernel-vmi-devel is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063960" version="1" comment="kernel-vmi is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063961" version="1" comment="kernel-xen-base is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063962" version="1" comment="kernel-xen-devel is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063963" version="1" comment="kernel-xen is &lt;2.6.34.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063964" version="1" comment="preload-kmp-default is &lt;1.1_k2.6.34.7_0.5-19.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063965" version="1" comment="preload-kmp-desktop is &lt;1.1_k2.6.34.7_0.5-19.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063473" version="1" comment="freetype2-devel-32bit is &lt;2.3.12-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063474" version="1" comment="freetype2-devel is &lt;2.3.12-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063475" version="1" comment="libfreetype6-32bit is &lt;2.3.12-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063476" version="1" comment="libfreetype6 is &lt;2.3.12-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062989" version="1" comment="ldapsmb is &lt;1.34b-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062990" version="1" comment="libldb-devel is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062991" version="1" comment="libldb0 is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062992" version="1" comment="libnetapi-devel is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062993" version="1" comment="libnetapi0 is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062994" version="1" comment="libsmbclient-devel is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062995" version="1" comment="libsmbclient0-32bit is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062996" version="1" comment="libsmbclient0 is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062997" version="1" comment="libsmbsharemodes-devel is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062998" version="1" comment="libsmbsharemodes0 is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062999" version="1" comment="libtalloc-devel is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063000" version="1" comment="libtalloc2 is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063001" version="1" comment="libtdb-devel is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063002" version="1" comment="libtdb1-32bit is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063003" version="1" comment="libtdb1 is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063004" version="1" comment="libtevent-devel is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063005" version="1" comment="libtevent0 is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063006" version="1" comment="libwbclient-devel is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063007" version="1" comment="libwbclient0-32bit is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063008" version="1" comment="libwbclient0 is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063009" version="1" comment="samba-32bit is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063010" version="1" comment="samba-client-32bit is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063011" version="1" comment="samba-client is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063012" version="1" comment="samba-devel is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063013" version="1" comment="samba-doc is &lt;3.5.4-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063014" version="1" comment="samba-doc is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063015" version="1" comment="samba-krb-printing is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063016" version="1" comment="samba-winbind-32bit is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063017" version="1" comment="samba-winbind is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063018" version="1" comment="samba is &lt;3.5.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063555" version="1" comment="squid3 is &lt;3.0.STABLE25-2.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064844" version="1" comment="encfs is &lt;1.6.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062678" version="1" comment="libtiff-devel-32bit is &lt;3.9.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062679" version="1" comment="libtiff-devel is &lt;3.9.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062680" version="1" comment="libtiff3-32bit is &lt;3.9.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062681" version="1" comment="libtiff3 is &lt;3.9.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062682" version="1" comment="tiff is &lt;3.9.2-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066987" version="1" comment="mailman is &lt;2.1.14-6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063906" version="1" comment="libfreebl3-32bit is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063907" version="1" comment="libfreebl3 is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063966" version="1" comment="libsoftokn3-32bit is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063967" version="1" comment="libsoftokn3 is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063908" version="1" comment="mozilla-nspr-32bit is &lt;4.8.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063909" version="1" comment="mozilla-nspr-devel is &lt;4.8.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063910" version="1" comment="mozilla-nspr is &lt;4.8.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063911" version="1" comment="mozilla-nss-32bit is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063968" version="1" comment="mozilla-nss-certs-32bit is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063969" version="1" comment="mozilla-nss-certs is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063912" version="1" comment="mozilla-nss-devel is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063970" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063971" version="1" comment="mozilla-nss-sysinit is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063913" version="1" comment="mozilla-nss-tools is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063914" version="1" comment="mozilla-nss is &lt;3.12.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064104" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064105" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064106" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064107" version="1" comment="MozillaFirefox is &lt;3.6.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064108" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064109" version="1" comment="mozilla-js192 is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064110" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064111" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064112" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064113" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064114" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064115" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064116" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064117" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064118" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064119" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.12-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062806" version="1" comment="dovecot12-backend-mysql is &lt;1.2.11-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062807" version="1" comment="dovecot12-backend-pgsql is &lt;1.2.11-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062808" version="1" comment="dovecot12-backend-sqlite is &lt;1.2.11-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062809" version="1" comment="dovecot12-devel is &lt;1.2.11-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062810" version="1" comment="dovecot12-fts-lucene is &lt;1.2.11-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062811" version="1" comment="dovecot12-fts-solr is &lt;1.2.11-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062812" version="1" comment="dovecot12 is &lt;1.2.11-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064963" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.6.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064964" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.6.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064965" version="1" comment="subversion-devel is &lt;1.6.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064966" version="1" comment="subversion-perl is &lt;1.6.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064967" version="1" comment="subversion-python is &lt;1.6.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064968" version="1" comment="subversion-ruby is &lt;1.6.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064969" version="1" comment="subversion-server is &lt;1.6.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064970" version="1" comment="subversion-tools is &lt;1.6.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064971" version="1" comment="subversion is &lt;1.6.9-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071644" version="1" comment="pam-32bit is &lt;1.1.1.90-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071645" version="1" comment="pam-devel-32bit is &lt;1.1.1.90-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071646" version="1" comment="pam-devel is &lt;1.1.1.90-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071647" version="1" comment="pam-doc is &lt;1.1.1.90-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071648" version="1" comment="pam is &lt;1.1.1.90-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063972" version="1" comment="postgresql-contrib is &lt;8.4.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063973" version="1" comment="postgresql-devel is &lt;8.4.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063974" version="1" comment="postgresql-docs is &lt;8.4.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063975" version="1" comment="postgresql-libs-32bit is &lt;8.4.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063976" version="1" comment="postgresql-libs is &lt;8.4.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063977" version="1" comment="postgresql-plperl is &lt;8.4.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063978" version="1" comment="postgresql-plpython is &lt;8.4.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063979" version="1" comment="postgresql-pltcl is &lt;8.4.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063980" version="1" comment="postgresql-server is &lt;8.4.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063981" version="1" comment="postgresql is &lt;8.4.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064073" version="1" comment="clamav-db is &lt;0.96.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064074" version="1" comment="clamav is &lt;0.96.3-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065040" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065041" version="1" comment="libpython2_6-1_0 is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065042" version="1" comment="python-32bit is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065043" version="1" comment="python-base-32bit is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065044" version="1" comment="python-base is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065045" version="1" comment="python-curses is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065046" version="1" comment="python-demo is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065047" version="1" comment="python-devel is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065048" version="1" comment="python-gdbm is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065049" version="1" comment="python-idle is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065050" version="1" comment="python-tk is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065051" version="1" comment="python-xml is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065052" version="1" comment="python is &lt;2.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064537" version="1" comment="openslp-32bit is &lt;1.2.0-180.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064538" version="1" comment="openslp-devel is &lt;1.2.0-180.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064539" version="1" comment="openslp-server is &lt;1.2.0-180.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064540" version="1" comment="openslp is &lt;1.2.0-180.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064252" version="1" comment="dhcp-client is &lt;4.1.1.P1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064253" version="1" comment="dhcp-devel is &lt;4.1.1.P1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064254" version="1" comment="dhcp-doc is &lt;4.1.1.P1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064255" version="1" comment="dhcp-relay is &lt;4.1.1.P1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064256" version="1" comment="dhcp-server is &lt;4.1.1.P1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064257" version="1" comment="dhcp is &lt;4.1.1.P1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064884" version="1" comment="bind-chrootenv is &lt;9.7.1P2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064885" version="1" comment="bind-devel is &lt;9.7.1P2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064886" version="1" comment="bind-doc is &lt;9.7.1P2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064887" version="1" comment="bind-libs-32bit is &lt;9.7.1P2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064888" version="1" comment="bind-libs is &lt;9.7.1P2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064889" version="1" comment="bind-utils is &lt;9.7.1P2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064890" version="1" comment="bind is &lt;9.7.1P2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064232" version="1" comment="flash-player is &lt;10.1.102.64-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064862" version="1" comment="acroread is &lt;9.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067970" version="1" comment="kernel-debug-base is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067971" version="1" comment="kernel-debug-devel is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067972" version="1" comment="kernel-debug is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067973" version="1" comment="kernel-default-base is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067974" version="1" comment="kernel-default-devel is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067975" version="1" comment="kernel-default is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067976" version="1" comment="kernel-desktop-base is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067977" version="1" comment="kernel-desktop-devel is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067978" version="1" comment="kernel-desktop is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067979" version="1" comment="kernel-devel is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067980" version="1" comment="kernel-ec2-base is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067981" version="1" comment="kernel-ec2-devel is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067982" version="1" comment="kernel-ec2-extra is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067983" version="1" comment="kernel-ec2 is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067984" version="1" comment="kernel-pae-base is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067985" version="1" comment="kernel-pae-devel is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067986" version="1" comment="kernel-pae is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067987" version="1" comment="kernel-source-vanilla is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067988" version="1" comment="kernel-source is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067989" version="1" comment="kernel-syms is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067990" version="1" comment="kernel-trace-base is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067991" version="1" comment="kernel-trace-devel is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067992" version="1" comment="kernel-trace is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067993" version="1" comment="kernel-vanilla-base is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067994" version="1" comment="kernel-vanilla-devel is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067995" version="1" comment="kernel-vanilla is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067996" version="1" comment="kernel-vmi-base is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067997" version="1" comment="kernel-vmi-devel is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067998" version="1" comment="kernel-vmi is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067999" version="1" comment="kernel-xen-base is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068000" version="1" comment="kernel-xen-devel is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068001" version="1" comment="kernel-xen is &lt;2.6.34.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068002" version="1" comment="preload-kmp-default is &lt;1.1_k2.6.34.8_0.2-19.1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068003" version="1" comment="preload-kmp-desktop is &lt;1.1_k2.6.34.8_0.2-19.1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064477" version="1" comment="libpoppler-devel is &lt;0.12.3-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064478" version="1" comment="libpoppler-doc is &lt;0.12.3-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064479" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064480" version="1" comment="libpoppler-glib4 is &lt;0.12.3-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064481" version="1" comment="libpoppler5 is &lt;0.12.3-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064482" version="1" comment="poppler-tools is &lt;0.12.3-5.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064089" version="1" comment="dovecot12-backend-mysql is &lt;1.2.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064090" version="1" comment="dovecot12-backend-pgsql is &lt;1.2.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064091" version="1" comment="dovecot12-backend-sqlite is &lt;1.2.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064092" version="1" comment="dovecot12-devel is &lt;1.2.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064093" version="1" comment="dovecot12-fts-lucene is &lt;1.2.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064094" version="1" comment="dovecot12-fts-solr is &lt;1.2.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064095" version="1" comment="dovecot12 is &lt;1.2.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066775" version="1" comment="apache2-mod_php5 is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066776" version="1" comment="php5-bcmath is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066777" version="1" comment="php5-bz2 is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066778" version="1" comment="php5-calendar is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066779" version="1" comment="php5-ctype is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066780" version="1" comment="php5-curl is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066781" version="1" comment="php5-dba is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066782" version="1" comment="php5-devel is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066783" version="1" comment="php5-dom is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066784" version="1" comment="php5-enchant is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066785" version="1" comment="php5-exif is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066786" version="1" comment="php5-fastcgi is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066787" version="1" comment="php5-fileinfo is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066788" version="1" comment="php5-ftp is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066789" version="1" comment="php5-gd is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066790" version="1" comment="php5-gettext is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066791" version="1" comment="php5-gmp is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066792" version="1" comment="php5-hash is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066793" version="1" comment="php5-iconv is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066794" version="1" comment="php5-imap is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066795" version="1" comment="php5-intl is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066796" version="1" comment="php5-json is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066797" version="1" comment="php5-ldap is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066798" version="1" comment="php5-mbstring is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066799" version="1" comment="php5-mcrypt is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066800" version="1" comment="php5-mysql is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066801" version="1" comment="php5-odbc is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066802" version="1" comment="php5-openssl is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066803" version="1" comment="php5-pcntl is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066804" version="1" comment="php5-pdo is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066805" version="1" comment="php5-pear is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066806" version="1" comment="php5-pgsql is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066807" version="1" comment="php5-phar is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066808" version="1" comment="php5-posix is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066809" version="1" comment="php5-pspell is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066810" version="1" comment="php5-readline is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066811" version="1" comment="php5-shmop is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066812" version="1" comment="php5-snmp is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066813" version="1" comment="php5-soap is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066814" version="1" comment="php5-sockets is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066815" version="1" comment="php5-sqlite is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066816" version="1" comment="php5-suhosin is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066817" version="1" comment="php5-sysvmsg is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066818" version="1" comment="php5-sysvsem is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066819" version="1" comment="php5-sysvshm is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066820" version="1" comment="php5-tidy is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066821" version="1" comment="php5-tokenizer is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066822" version="1" comment="php5-wddx is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066823" version="1" comment="php5-xmlreader is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066824" version="1" comment="php5-xmlrpc is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066825" version="1" comment="php5-xmlwriter is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066826" version="1" comment="php5-xsl is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066827" version="1" comment="php5-zip is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066828" version="1" comment="php5-zlib is &lt;5.3.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064658" version="1" comment="apache2-mod_php5 is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064659" version="1" comment="php5-bcmath is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064660" version="1" comment="php5-bz2 is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064661" version="1" comment="php5-calendar is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064662" version="1" comment="php5-ctype is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064663" version="1" comment="php5-curl is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064664" version="1" comment="php5-dba is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064665" version="1" comment="php5-devel is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064666" version="1" comment="php5-dom is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064667" version="1" comment="php5-enchant is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064668" version="1" comment="php5-exif is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064669" version="1" comment="php5-fastcgi is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064670" version="1" comment="php5-fileinfo is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064671" version="1" comment="php5-ftp is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064672" version="1" comment="php5-gd is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064673" version="1" comment="php5-gettext is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064674" version="1" comment="php5-gmp is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064675" version="1" comment="php5-hash is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064676" version="1" comment="php5-iconv is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064677" version="1" comment="php5-imap is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064678" version="1" comment="php5-intl is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064679" version="1" comment="php5-json is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064680" version="1" comment="php5-ldap is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064681" version="1" comment="php5-mbstring is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064682" version="1" comment="php5-mcrypt is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064683" version="1" comment="php5-mysql is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064684" version="1" comment="php5-odbc is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064685" version="1" comment="php5-openssl is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064686" version="1" comment="php5-pcntl is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064687" version="1" comment="php5-pdo is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064688" version="1" comment="php5-pear is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064689" version="1" comment="php5-pgsql is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064690" version="1" comment="php5-phar is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064691" version="1" comment="php5-posix is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064692" version="1" comment="php5-pspell is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064693" version="1" comment="php5-readline is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064694" version="1" comment="php5-shmop is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064695" version="1" comment="php5-snmp is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064696" version="1" comment="php5-soap is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064697" version="1" comment="php5-sockets is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064698" version="1" comment="php5-sqlite is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064699" version="1" comment="php5-suhosin is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064700" version="1" comment="php5-sysvmsg is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064701" version="1" comment="php5-sysvsem is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064702" version="1" comment="php5-sysvshm is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064703" version="1" comment="php5-tidy is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064704" version="1" comment="php5-tokenizer is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064705" version="1" comment="php5-wddx is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064706" version="1" comment="php5-xmlreader is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064707" version="1" comment="php5-xmlrpc is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064708" version="1" comment="php5-xmlwriter is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064709" version="1" comment="php5-xsl is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064710" version="1" comment="php5-zip is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064711" version="1" comment="php5-zlib is &lt;5.3.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065925" version="1" comment="tomcat6-admin-webapps is &lt;6.0.24-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065926" version="1" comment="tomcat6-docs-webapp is &lt;6.0.24-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065927" version="1" comment="tomcat6-el-1_0-api is &lt;6.0.24-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065928" version="1" comment="tomcat6-javadoc is &lt;6.0.24-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065929" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.24-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065930" version="1" comment="tomcat6-lib is &lt;6.0.24-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065931" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.24-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065932" version="1" comment="tomcat6-webapps is &lt;6.0.24-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065933" version="1" comment="tomcat6 is &lt;6.0.24-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064120" version="1" comment="seamonkey-dom-inspector is &lt;2.0.10-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064121" version="1" comment="seamonkey-irc is &lt;2.0.10-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064128" version="1" comment="seamonkey-translations-common is &lt;2.0.10-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064129" version="1" comment="seamonkey-translations-other is &lt;2.0.10-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064122" version="1" comment="seamonkey-venkman is &lt;2.0.10-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064123" version="1" comment="seamonkey is &lt;2.0.10-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064124" version="1" comment="MozillaThunderbird-devel is &lt;3.0.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064125" version="1" comment="MozillaThunderbird-translations-common is &lt;3.0.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064126" version="1" comment="MozillaThunderbird-translations-other is &lt;3.0.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064127" version="1" comment="MozillaThunderbird is &lt;3.0.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064130" version="1" comment="enigmail is &lt;1.0.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067744" version="1" comment="freetype2-devel-32bit is &lt;2.3.12-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067745" version="1" comment="freetype2-devel is &lt;2.3.12-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067746" version="1" comment="libfreetype6-32bit is &lt;2.3.12-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067747" version="1" comment="libfreetype6 is &lt;2.3.12-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069350" version="1" comment="libmysqlclusterclient16 is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069351" version="1" comment="libmysqlclusterclient_r16 is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069352" version="1" comment="mysql-cluster-bench is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069353" version="1" comment="mysql-cluster-client is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069354" version="1" comment="mysql-cluster-debug is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069355" version="1" comment="mysql-cluster-ndb-extra is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069356" version="1" comment="mysql-cluster-ndb-management is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069357" version="1" comment="mysql-cluster-ndb-storage is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069358" version="1" comment="mysql-cluster-ndb-tools is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069359" version="1" comment="mysql-cluster-test is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069360" version="1" comment="mysql-cluster-tools is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069361" version="1" comment="mysql-cluster is &lt;7.0.25-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069332" version="1" comment="libmariadbclient16 is &lt;5.1.55-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069333" version="1" comment="libmariadbclient_r16 is &lt;5.1.55-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069334" version="1" comment="mariadb-bench is &lt;5.1.55-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069335" version="1" comment="mariadb-client is &lt;5.1.55-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069336" version="1" comment="mariadb-debug is &lt;5.1.55-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069337" version="1" comment="mariadb-test is &lt;5.1.55-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069338" version="1" comment="mariadb-tools is &lt;5.1.55-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069339" version="1" comment="mariadb is &lt;5.1.55-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071904" version="1" comment="libmysqlclient-devel is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071905" version="1" comment="libmysqlclient16-32bit is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071906" version="1" comment="libmysqlclient16 is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071907" version="1" comment="libmysqlclient_r16-32bit is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071908" version="1" comment="libmysqlclient_r16 is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071909" version="1" comment="libmysqld-devel is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071910" version="1" comment="libmysqld0 is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071911" version="1" comment="mysql-community-server-bench is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071912" version="1" comment="mysql-community-server-client is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071913" version="1" comment="mysql-community-server-debug is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071914" version="1" comment="mysql-community-server-test is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071915" version="1" comment="mysql-community-server-tools is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071916" version="1" comment="mysql-community-server is &lt;5.1.57-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063982" version="1" comment="glibc-32bit is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063983" version="1" comment="glibc-devel-32bit is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063984" version="1" comment="glibc-devel is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063985" version="1" comment="glibc-html is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063986" version="1" comment="glibc-i18ndata is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063987" version="1" comment="glibc-info is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063988" version="1" comment="glibc-locale-32bit is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063989" version="1" comment="glibc-locale is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063990" version="1" comment="glibc-obsolete is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063991" version="1" comment="glibc-profile-32bit is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063992" version="1" comment="glibc-profile is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063993" version="1" comment="glibc is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063994" version="1" comment="nscd is &lt;2.11.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064793" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b20.1.9.2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064794" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b20.1.9.2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064795" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b20.1.9.2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064796" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.0.0_b20.1.9.2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064797" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b20.1.9.2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064798" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b20.1.9.2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064449" version="1" comment="libopenssl-devel is &lt;1.0.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064450" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8m-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064451" version="1" comment="libopenssl0_9_8 is &lt;0.9.8m-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064452" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064453" version="1" comment="libopenssl1_0_0 is &lt;1.0.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064454" version="1" comment="openssl-doc is &lt;1.0.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064455" version="1" comment="openssl is &lt;1.0.0-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069759" version="1" comment="apache2-mod_fcgid is &lt;2.2-101.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066692" version="1" comment="fuse-devel-static is &lt;2.8.5-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066693" version="1" comment="fuse-devel is &lt;2.8.5-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066694" version="1" comment="fuse is &lt;2.8.5-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066695" version="1" comment="libblkid-devel-32bit is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066696" version="1" comment="libblkid-devel is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066697" version="1" comment="libblkid1-32bit is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066698" version="1" comment="libblkid1 is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066699" version="1" comment="libfuse2-32bit is &lt;2.8.5-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066700" version="1" comment="libfuse2 is &lt;2.8.5-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066701" version="1" comment="libuuid-devel-32bit is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066702" version="1" comment="libuuid-devel is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066703" version="1" comment="libuuid1-32bit is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066704" version="1" comment="libuuid1 is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066705" version="1" comment="util-linux-lang is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066706" version="1" comment="util-linux is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066707" version="1" comment="uuidd is &lt;2.17.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072514" version="1" comment="kernel-debug-base is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072515" version="1" comment="kernel-debug-devel is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072516" version="1" comment="kernel-debug is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072517" version="1" comment="kernel-default-base is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072518" version="1" comment="kernel-default-devel is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072519" version="1" comment="kernel-default is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072520" version="1" comment="kernel-desktop-base is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072521" version="1" comment="kernel-desktop-devel is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072522" version="1" comment="kernel-desktop is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072523" version="1" comment="kernel-devel is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072524" version="1" comment="kernel-ec2-base is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072525" version="1" comment="kernel-ec2-devel is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072526" version="1" comment="kernel-ec2-extra is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072527" version="1" comment="kernel-ec2 is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072528" version="1" comment="kernel-pae-base is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072529" version="1" comment="kernel-pae-devel is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072530" version="1" comment="kernel-pae is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072531" version="1" comment="kernel-source-vanilla is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072532" version="1" comment="kernel-source is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072533" version="1" comment="kernel-syms is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072534" version="1" comment="kernel-trace-base is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072535" version="1" comment="kernel-trace-devel is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072536" version="1" comment="kernel-trace is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072537" version="1" comment="kernel-vanilla-base is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072538" version="1" comment="kernel-vanilla-devel is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072539" version="1" comment="kernel-vanilla is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072540" version="1" comment="kernel-vmi-base is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072541" version="1" comment="kernel-vmi-devel is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072542" version="1" comment="kernel-vmi is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072543" version="1" comment="kernel-xen-base is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072544" version="1" comment="kernel-xen-devel is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072545" version="1" comment="kernel-xen is &lt;2.6.34.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072546" version="1" comment="preload-kmp-default is &lt;1.1_k2.6.34.10_0.6-19.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072547" version="1" comment="preload-kmp-desktop is &lt;1.1_k2.6.34.10_0.6-19.1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072125" version="1" comment="rubygem-actionmailer-2_3 is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072126" version="1" comment="rubygem-actionmailer is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072127" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072128" version="1" comment="rubygem-actionpack is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072129" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072130" version="1" comment="rubygem-activerecord is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072131" version="1" comment="rubygem-activeresource-2_3 is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072132" version="1" comment="rubygem-activeresource is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072133" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072134" version="1" comment="rubygem-activesupport is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072135" version="1" comment="rubygem-rack is &lt;1.1.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072136" version="1" comment="rubygem-rails-2_3 is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072137" version="1" comment="rubygem-rails is &lt;2.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063835" version="1" comment="festival-devel is &lt;1.96-126.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063836" version="1" comment="festival is &lt;1.96-126.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064582" version="1" comment="tomboy-lang is &lt;1.2.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064583" version="1" comment="tomboy is &lt;1.2.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064584" version="1" comment="libxml2-32bit is &lt;2.7.7-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064585" version="1" comment="libxml2-devel-32bit is &lt;2.7.7-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064586" version="1" comment="libxml2-devel is &lt;2.7.7-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064587" version="1" comment="libxml2-doc is &lt;2.7.7-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064588" version="1" comment="libxml2 is &lt;2.7.7-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066606" version="1" comment="postgresql-contrib is &lt;8.4.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066607" version="1" comment="postgresql-devel is &lt;8.4.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066608" version="1" comment="postgresql-docs is &lt;8.4.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066609" version="1" comment="postgresql-libs-32bit is &lt;8.4.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066610" version="1" comment="postgresql-libs is &lt;8.4.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066611" version="1" comment="postgresql-plperl is &lt;8.4.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066612" version="1" comment="postgresql-plpython is &lt;8.4.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066613" version="1" comment="postgresql-pltcl is &lt;8.4.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066614" version="1" comment="postgresql-server is &lt;8.4.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066615" version="1" comment="postgresql is &lt;8.4.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065778" version="1" comment="krb5-32bit is &lt;1.8.1-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065779" version="1" comment="krb5-client is &lt;1.8.1-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065780" version="1" comment="krb5-devel-32bit is &lt;1.8.1-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065781" version="1" comment="krb5-devel is &lt;1.8.1-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065782" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.1-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065783" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.1-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065784" version="1" comment="krb5-server is &lt;1.8.1-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065785" version="1" comment="krb5 is &lt;1.8.1-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065965" version="1" comment="acroread is &lt;9.4.2-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064320" version="1" comment="monotone is &lt;0.48.1-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065667" version="1" comment="tomcat6-admin-webapps is &lt;6.0.24-5.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065668" version="1" comment="tomcat6-docs-webapp is &lt;6.0.24-5.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065669" version="1" comment="tomcat6-el-1_0-api is &lt;6.0.24-5.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065670" version="1" comment="tomcat6-javadoc is &lt;6.0.24-5.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065671" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.24-5.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065672" version="1" comment="tomcat6-lib is &lt;6.0.24-5.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065673" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.24-5.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065674" version="1" comment="tomcat6-webapps is &lt;6.0.24-5.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065675" version="1" comment="tomcat6 is &lt;6.0.24-5.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065435" version="1" comment="libopenssl-devel is &lt;1.0.0-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065436" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8m-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065437" version="1" comment="libopenssl0_9_8 is &lt;0.9.8m-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065438" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.0-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065439" version="1" comment="libopenssl1_0_0 is &lt;1.0.0-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065440" version="1" comment="openssl-doc is &lt;1.0.0-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065441" version="1" comment="openssl is &lt;1.0.0-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066154" version="1" comment="build-mkbaselibs is &lt;2010.07.28-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066153" version="1" comment="build is &lt;2010.07.28-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064845" version="1" comment="mercurial is &lt;1.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065178" version="1" comment="libmoon-devel is &lt;2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065179" version="1" comment="libmoon0 is &lt;2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065180" version="1" comment="moonlight-desktop-devel is &lt;2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065181" version="1" comment="moonlight-desktop is &lt;2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065182" version="1" comment="moonlight-plugin is &lt;2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065183" version="1" comment="moonlight-tools is &lt;2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065184" version="1" comment="moonlight-web-devel is &lt;2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069146" version="1" comment="vm-install is &lt;0.4.27-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069147" version="1" comment="xen-devel is &lt;4.0.1_21326_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069148" version="1" comment="xen-doc-html is &lt;4.0.1_21326_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069149" version="1" comment="xen-doc-pdf is &lt;4.0.1_21326_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069150" version="1" comment="xen-kmp-default is &lt;4.0.1_21326_02_k2.6.34.7_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069151" version="1" comment="xen-kmp-desktop is &lt;4.0.1_21326_02_k2.6.34.7_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069152" version="1" comment="xen-kmp-pae is &lt;4.0.1_21326_02_k2.6.34.7_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069153" version="1" comment="xen-libs is &lt;4.0.1_21326_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069154" version="1" comment="xen-tools-domU is &lt;4.0.1_21326_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069155" version="1" comment="xen-tools is &lt;4.0.1_21326_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069156" version="1" comment="xen is &lt;4.0.1_21326_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064961" version="1" comment="clamav-db is &lt;0.96.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064962" version="1" comment="clamav is &lt;0.96.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065620" version="1" comment="hplip-hpijs is &lt;3.10.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065621" version="1" comment="hplip is &lt;3.10.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065564" version="1" comment="libcollection-devel is &lt;0.4.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065565" version="1" comment="libcollection1 is &lt;0.4.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065566" version="1" comment="libdhash-devel is &lt;0.4.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065567" version="1" comment="libdhash1 is &lt;0.4.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065568" version="1" comment="libini_config-devel is &lt;0.4.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065569" version="1" comment="libini_config1 is &lt;0.4.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065570" version="1" comment="python-sssd-config is &lt;1.1.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065571" version="1" comment="sssd-32bit is &lt;1.1.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065572" version="1" comment="sssd-ipa-provider is &lt;1.1.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065573" version="1" comment="sssd-tools is &lt;1.1.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065574" version="1" comment="sssd is &lt;1.1.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065113" version="1" comment="exim is &lt;4.71-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065114" version="1" comment="eximon is &lt;4.71-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065115" version="1" comment="eximstats-html is &lt;4.71-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065558" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b20.1.9.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065559" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b20.1.9.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065560" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b20.1.9.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065561" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.0.0_b20.1.9.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065562" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b20.1.9.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065563" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b20.1.9.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068004" version="1" comment="dbus-1-32bit is &lt;1.2.24-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068005" version="1" comment="dbus-1-devel-32bit is &lt;1.2.24-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068006" version="1" comment="dbus-1-devel-doc is &lt;1.2.24-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068007" version="1" comment="dbus-1-devel is &lt;1.2.24-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068008" version="1" comment="dbus-1 is &lt;1.2.24-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072650" version="1" comment="icu-data is &lt;4.2-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072651" version="1" comment="icu is &lt;4.2-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072652" version="1" comment="libicu-32bit is &lt;4.2-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072653" version="1" comment="libicu-devel-32bit is &lt;4.2-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072654" version="1" comment="libicu-devel is &lt;4.2-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072655" version="1" comment="libicu-doc is &lt;4.2-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072656" version="1" comment="libicu is &lt;4.2-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065666" version="1" comment="perl-CGI-Simple is &lt;1.113-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065833" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065835" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065836" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065837" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065838" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065839" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065972" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b20.1.9.7-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065973" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b20.1.9.7-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065974" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b20.1.9.7-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065975" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.0.0_b20.1.9.7-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065976" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b20.1.9.7-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065977" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b20.1.9.7-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066622" version="1" comment="libxml2-32bit is &lt;2.7.7-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066623" version="1" comment="libxml2-devel-32bit is &lt;2.7.7-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066624" version="1" comment="libxml2-devel is &lt;2.7.7-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066625" version="1" comment="libxml2-doc is &lt;2.7.7-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066626" version="1" comment="libxml2 is &lt;2.7.7-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065321" version="1" comment="opera-gtk is &lt;11.00-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065322" version="1" comment="opera-kde4 is &lt;11.00-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065323" version="1" comment="opera is &lt;11.00-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065494" version="1" comment="libopensc2-32bit is &lt;0.11.13-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065495" version="1" comment="libopensc2 is &lt;0.11.13-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065496" version="1" comment="opensc-32bit is &lt;0.11.13-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065497" version="1" comment="opensc-devel is &lt;0.11.13-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065498" version="1" comment="opensc is &lt;0.11.13-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065467" version="1" comment="finch-devel is &lt;2.7.9-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065468" version="1" comment="finch is &lt;2.7.9-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065469" version="1" comment="libpurple-devel is &lt;2.7.9-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065470" version="1" comment="libpurple-lang is &lt;2.7.9-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065471" version="1" comment="libpurple-meanwhile is &lt;2.7.9-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065472" version="1" comment="libpurple-mono is &lt;2.7.9-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065473" version="1" comment="libpurple-tcl is &lt;2.7.9-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065474" version="1" comment="libpurple is &lt;2.7.9-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065475" version="1" comment="pidgin-devel is &lt;2.7.9-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065476" version="1" comment="pidgin-otr is &lt;3.2.0-146.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065477" version="1" comment="pidgin is &lt;2.7.9-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065693" version="1" comment="libpcsclite1-32bit is &lt;1.5.5-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065694" version="1" comment="libpcsclite1 is &lt;1.5.5-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065695" version="1" comment="pcsc-ccid is &lt;1.3.11-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065696" version="1" comment="pcsc-lite-devel is &lt;1.5.5-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065697" version="1" comment="pcsc-lite is &lt;1.5.5-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065872" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.6.9-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065873" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.6.9-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065874" version="1" comment="subversion-devel is &lt;1.6.9-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065875" version="1" comment="subversion-perl is &lt;1.6.9-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065876" version="1" comment="subversion-python is &lt;1.6.9-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065877" version="1" comment="subversion-ruby is &lt;1.6.9-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065878" version="1" comment="subversion-server is &lt;1.6.9-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065879" version="1" comment="subversion-tools is &lt;1.6.9-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065880" version="1" comment="subversion is &lt;1.6.9-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066030" version="1" comment="gimp-branding-upstream is &lt;2.6.8-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066031" version="1" comment="gimp-devel is &lt;2.6.8-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066032" version="1" comment="gimp-help-browser is &lt;2.6.8-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066033" version="1" comment="gimp-lang is &lt;2.6.8-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066034" version="1" comment="gimp-module-hal is &lt;2.6.8-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066035" version="1" comment="gimp-plugins-python is &lt;2.6.8-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066036" version="1" comment="gimp is &lt;2.6.8-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068009" version="1" comment="udisks-devel is &lt;1.0.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068010" version="1" comment="udisks is &lt;1.0.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068811" version="1" comment="ConsoleKit-32bit is &lt;0.4.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068812" version="1" comment="ConsoleKit-devel is &lt;0.4.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068813" version="1" comment="ConsoleKit-x11 is &lt;0.4.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068814" version="1" comment="ConsoleKit is &lt;0.4.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068433" version="1" comment="perl-32bit is &lt;5.12.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068434" version="1" comment="perl-base-32bit is &lt;5.12.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068435" version="1" comment="perl-base is &lt;5.12.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068436" version="1" comment="perl-doc is &lt;5.12.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068437" version="1" comment="perl is &lt;5.12.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066563" version="1" comment="libopenssl-devel is &lt;1.0.0-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066564" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8m-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066565" version="1" comment="libopenssl0_9_8 is &lt;0.9.8m-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066566" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.0-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066567" version="1" comment="libopenssl1_0_0 is &lt;1.0.0-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066568" version="1" comment="openssl-doc is &lt;1.0.0-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066569" version="1" comment="openssl is &lt;1.0.0-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065734" version="1" comment="exim is &lt;4.71-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065735" version="1" comment="eximon is &lt;4.71-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065736" version="1" comment="eximstats-html is &lt;4.71-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066480" version="1" comment="pango-32bit is &lt;1.28.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066481" version="1" comment="pango-devel is &lt;1.28.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066482" version="1" comment="pango-module-thai-lang is &lt;1.28.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066483" version="1" comment="pango is &lt;1.28.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065722" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b20.1.9.5-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065723" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b20.1.9.5-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065724" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b20.1.9.5-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065725" version="1" comment="java-1_6_0-openjdk-plugin is &lt;1.6.0.0_b20.1.9.5-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065726" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b20.1.9.5-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065727" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b20.1.9.5-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068224" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068236" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068237" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068225" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068238" version="1" comment="mozilla-xulrunner191-translations-common is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068239" version="1" comment="mozilla-xulrunner191-translations-other is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068228" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068240" version="1" comment="python-xpcom191 is &lt;1.9.1.19-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068241" version="1" comment="seamonkey-dom-inspector is &lt;2.0.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068242" version="1" comment="seamonkey-irc is &lt;2.0.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068265" version="1" comment="seamonkey-translations-common is &lt;2.0.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068266" version="1" comment="seamonkey-translations-other is &lt;2.0.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068243" version="1" comment="seamonkey-venkman is &lt;2.0.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068244" version="1" comment="seamonkey is &lt;2.0.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068245" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068246" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068247" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068230" version="1" comment="MozillaFirefox is &lt;3.6.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068248" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068249" version="1" comment="mozilla-js192 is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068250" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068251" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068252" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068253" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068254" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068255" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068256" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068257" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068258" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068259" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068260" version="1" comment="MozillaThunderbird-devel is &lt;3.1.10-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068261" version="1" comment="MozillaThunderbird-translations-common is &lt;3.1.10-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068262" version="1" comment="MozillaThunderbird-translations-other is &lt;3.1.10-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068263" version="1" comment="MozillaThunderbird is &lt;3.1.10-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068264" version="1" comment="enigmail is &lt;1.1.2-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069284" version="1" comment="MozillaThunderbird-devel is &lt;3.1.11-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069285" version="1" comment="MozillaThunderbird-translations-common is &lt;3.1.11-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069286" version="1" comment="MozillaThunderbird-translations-other is &lt;3.1.11-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069287" version="1" comment="MozillaThunderbird is &lt;3.1.11-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069288" version="1" comment="enigmail is &lt;1.1.2-9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069289" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.18-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069290" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.18-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069291" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.18-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069275" version="1" comment="MozillaFirefox is &lt;3.6.18-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069292" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069293" version="1" comment="mozilla-js192 is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069276" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069294" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069295" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069296" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069277" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069297" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069298" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069299" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069300" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069280" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.18-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070062" version="1" comment="seamonkey-dom-inspector is &lt;2.3-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070063" version="1" comment="seamonkey-irc is &lt;2.3-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070064" version="1" comment="seamonkey-translations-common is &lt;2.3-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070065" version="1" comment="seamonkey-translations-other is &lt;2.3-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070066" version="1" comment="seamonkey-venkman is &lt;2.3-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070067" version="1" comment="seamonkey is &lt;2.3-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070068" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.20-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070069" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.20-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070070" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.20-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070071" version="1" comment="MozillaFirefox is &lt;3.6.20-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070072" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070073" version="1" comment="mozilla-js192 is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070074" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070075" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070076" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070077" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070078" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070079" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070080" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070081" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070082" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070083" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.20-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070096" version="1" comment="MozillaThunderbird-devel is &lt;3.1.12-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070097" version="1" comment="MozillaThunderbird-translations-common is &lt;3.1.12-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070098" version="1" comment="MozillaThunderbird-translations-other is &lt;3.1.12-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070099" version="1" comment="MozillaThunderbird is &lt;3.1.12-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070100" version="1" comment="enigmail is &lt;1.1.2+3.1.12-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066185" version="1" comment="libtiff-devel-32bit is &lt;3.9.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066186" version="1" comment="libtiff-devel is &lt;3.9.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066187" version="1" comment="libtiff3-32bit is &lt;3.9.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066188" version="1" comment="libtiff3 is &lt;3.9.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066189" version="1" comment="tiff is &lt;3.9.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069570" version="1" comment="freetype2-devel-32bit is &lt;2.3.12-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069571" version="1" comment="freetype2-devel is &lt;2.3.12-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069572" version="1" comment="libfreetype6-32bit is &lt;2.3.12-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069573" version="1" comment="libfreetype6 is &lt;2.3.12-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066209" version="1" comment="krb5-32bit is &lt;1.8.1-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066210" version="1" comment="krb5-client is &lt;1.8.1-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066211" version="1" comment="krb5-devel-32bit is &lt;1.8.1-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066212" version="1" comment="krb5-devel is &lt;1.8.1-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066213" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.1-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066214" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.1-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066215" version="1" comment="krb5-server is &lt;1.8.1-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066216" version="1" comment="krb5 is &lt;1.8.1-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067715" version="1" comment="krb5-32bit is &lt;1.8.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067716" version="1" comment="krb5-client is &lt;1.8.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067717" version="1" comment="krb5-devel-32bit is &lt;1.8.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067718" version="1" comment="krb5-devel is &lt;1.8.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067719" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067720" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067721" version="1" comment="krb5-server is &lt;1.8.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067722" version="1" comment="krb5 is &lt;1.8.1-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067810" version="1" comment="postfix-devel is &lt;2.7.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067811" version="1" comment="postfix-doc is &lt;2.7.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067812" version="1" comment="postfix-mysql is &lt;2.7.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067813" version="1" comment="postfix-postgresql is &lt;2.7.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067814" version="1" comment="postfix is &lt;2.7.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068438" version="1" comment="pure-ftpd is &lt;1.0.29-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065716" version="1" comment="dhcp-client is &lt;4.1.2.ESV.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065717" version="1" comment="dhcp-devel is &lt;4.1.2.ESV.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065718" version="1" comment="dhcp-doc is &lt;4.1.2.ESV.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065719" version="1" comment="dhcp-relay is &lt;4.1.2.ESV.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065720" version="1" comment="dhcp-server is &lt;4.1.2.ESV.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065721" version="1" comment="dhcp is &lt;4.1.2.ESV.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065881" version="1" comment="bind-chrootenv is &lt;9.7.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065882" version="1" comment="bind-devel is &lt;9.7.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065883" version="1" comment="bind-doc is &lt;9.7.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065884" version="1" comment="bind-libs-32bit is &lt;9.7.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065885" version="1" comment="bind-libs is &lt;9.7.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065886" version="1" comment="bind-utils is &lt;9.7.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065887" version="1" comment="bind is &lt;9.7.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068862" version="1" comment="apache2-mod_php5 is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068863" version="1" comment="php5-bcmath is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068864" version="1" comment="php5-bz2 is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068865" version="1" comment="php5-calendar is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068866" version="1" comment="php5-ctype is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068867" version="1" comment="php5-curl is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068868" version="1" comment="php5-dba is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068869" version="1" comment="php5-devel is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068870" version="1" comment="php5-dom is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068871" version="1" comment="php5-enchant is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068872" version="1" comment="php5-exif is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068873" version="1" comment="php5-fastcgi is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068874" version="1" comment="php5-fileinfo is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068875" version="1" comment="php5-ftp is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068876" version="1" comment="php5-gd is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068877" version="1" comment="php5-gettext is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068878" version="1" comment="php5-gmp is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068879" version="1" comment="php5-hash is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068880" version="1" comment="php5-iconv is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068881" version="1" comment="php5-imap is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068882" version="1" comment="php5-intl is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068883" version="1" comment="php5-json is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068884" version="1" comment="php5-ldap is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068885" version="1" comment="php5-mbstring is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068886" version="1" comment="php5-mcrypt is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068887" version="1" comment="php5-mysql is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068888" version="1" comment="php5-odbc is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068889" version="1" comment="php5-openssl is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068890" version="1" comment="php5-pcntl is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068891" version="1" comment="php5-pdo is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068892" version="1" comment="php5-pear is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068893" version="1" comment="php5-pgsql is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068894" version="1" comment="php5-phar is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068895" version="1" comment="php5-posix is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068896" version="1" comment="php5-pspell is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068897" version="1" comment="php5-readline is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068898" version="1" comment="php5-shmop is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068899" version="1" comment="php5-snmp is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068900" version="1" comment="php5-soap is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068901" version="1" comment="php5-sockets is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068902" version="1" comment="php5-sqlite is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068903" version="1" comment="php5-suhosin is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068904" version="1" comment="php5-sysvmsg is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068905" version="1" comment="php5-sysvsem is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068906" version="1" comment="php5-sysvshm is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068907" version="1" comment="php5-tidy is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068908" version="1" comment="php5-tokenizer is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068909" version="1" comment="php5-wddx is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068910" version="1" comment="php5-xmlreader is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068911" version="1" comment="php5-xmlrpc is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068912" version="1" comment="php5-xmlwriter is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068913" version="1" comment="php5-xsl is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068914" version="1" comment="php5-zip is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068915" version="1" comment="php5-zlib is &lt;5.3.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068341" version="1" comment="libzip-devel is &lt;0.9-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068342" version="1" comment="libzip-util is &lt;0.9-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068343" version="1" comment="libzip1 is &lt;0.9-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066843" version="1" comment="evince-devel is &lt;2.30.1-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066844" version="1" comment="evince-lang is &lt;2.30.1-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066845" version="1" comment="evince is &lt;2.30.1-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066846" version="1" comment="nautilus-evince is &lt;2.30.1-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067748" version="1" comment="kbd is &lt;1.14.1-31.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066133" version="1" comment="aaa_base is &lt;11.3-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066967" version="1" comment="xorg-x11-xauth is &lt;7.5-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066968" version="1" comment="xorg-x11 is &lt;7.5-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066418" version="1" comment="aaa_base is &lt;11.3-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066207" version="1" comment="nbd-doc is &lt;2.9.20-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066208" version="1" comment="nbd is &lt;2.9.20-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067264" version="1" comment="nbd-doc is &lt;2.9.20-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067265" version="1" comment="nbd is &lt;2.9.20-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065767" version="1" comment="flash-player is &lt;10.2.152.26-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068508" version="1" comment="flash-player is &lt;10.3.181.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066425" version="1" comment="flash-player is &lt;10.2.153.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066588" version="1" comment="flash-player is &lt;10.2.153.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067740" version="1" comment="flash-player is &lt;10.2.159.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065728" version="1" comment="opera-gtk is &lt;11.01-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065729" version="1" comment="opera-kde4 is &lt;11.01-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065730" version="1" comment="opera is &lt;11.01-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069056" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.6.9-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069057" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.6.9-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069058" version="1" comment="subversion-devel is &lt;1.6.9-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069059" version="1" comment="subversion-perl is &lt;1.6.9-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069060" version="1" comment="subversion-python is &lt;1.6.9-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069061" version="1" comment="subversion-ruby is &lt;1.6.9-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069062" version="1" comment="subversion-server is &lt;1.6.9-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069063" version="1" comment="subversion-tools is &lt;1.6.9-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069064" version="1" comment="subversion is &lt;1.6.9-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068011" version="1" comment="ldapsmb is &lt;1.34b-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068012" version="1" comment="libldb-devel is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068013" version="1" comment="libldb0 is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068014" version="1" comment="libnetapi-devel is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068015" version="1" comment="libnetapi0 is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068016" version="1" comment="libsmbclient-devel is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068017" version="1" comment="libsmbclient0-32bit is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068018" version="1" comment="libsmbclient0 is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068019" version="1" comment="libsmbsharemodes-devel is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068020" version="1" comment="libsmbsharemodes0 is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068021" version="1" comment="libtalloc-devel is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068022" version="1" comment="libtalloc2 is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068023" version="1" comment="libtdb-devel is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068024" version="1" comment="libtdb1-32bit is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068025" version="1" comment="libtdb1 is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068026" version="1" comment="libtevent-devel is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068027" version="1" comment="libtevent0 is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068028" version="1" comment="libwbclient-devel is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068029" version="1" comment="libwbclient0-32bit is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068030" version="1" comment="libwbclient0 is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068031" version="1" comment="samba-32bit is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068032" version="1" comment="samba-client-32bit is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068033" version="1" comment="samba-client is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068034" version="1" comment="samba-devel is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068035" version="1" comment="samba-doc is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068036" version="1" comment="samba-krb-printing is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068037" version="1" comment="samba-winbind-32bit is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068038" version="1" comment="samba-winbind is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068039" version="1" comment="samba is &lt;3.5.4-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066847" version="1" comment="gdm-branding-upstream is &lt;2.30.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066848" version="1" comment="gdm-lang is &lt;2.30.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066849" version="1" comment="gdm is &lt;2.30.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066850" version="1" comment="gnome-applets-gdm is &lt;2.30.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068332" version="1" comment="vsftpd is &lt;2.2.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068764" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u26-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068765" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u26-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068766" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u26-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068767" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u26-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068768" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u26-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068769" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u26-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069224" version="1" comment="icedtea-web-javadoc is &lt;1.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069225" version="1" comment="icedtea-web is &lt;1.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069226" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b22.1.10.2-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069227" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b22.1.10.2-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069228" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b22.1.10.2-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069229" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b22.1.10.2-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069230" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b22.1.10.2-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068439" version="1" comment="vino-lang is &lt;2.28.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068440" version="1" comment="vino is &lt;2.28.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067032" version="1" comment="libmoon-devel is &lt;2.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067033" version="1" comment="libmoon0 is &lt;2.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067034" version="1" comment="moonlight-desktop-devel is &lt;2.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067035" version="1" comment="moonlight-desktop is &lt;2.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067036" version="1" comment="moonlight-plugin is &lt;2.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067037" version="1" comment="moonlight-tools is &lt;2.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067038" version="1" comment="moonlight-web-devel is &lt;2.4.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067815" version="1" comment="dhcpcd is &lt;3.2.3-61.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067259" version="1" comment="dhcpcd is &lt;3.2.3-61.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067039" version="1" comment="dhcp-client is &lt;4.1.2.ESV.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067040" version="1" comment="dhcp-devel is &lt;4.1.2.ESV.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067041" version="1" comment="dhcp-doc is &lt;4.1.2.ESV.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067042" version="1" comment="dhcp-relay is &lt;4.1.2.ESV.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067043" version="1" comment="dhcp-server is &lt;4.1.2.ESV.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067044" version="1" comment="dhcp is &lt;4.1.2.ESV.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066969" version="1" comment="telepathy-gabble-doc is &lt;0.9.11-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066970" version="1" comment="telepathy-gabble is &lt;0.9.11-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065934" version="1" comment="avahi-compat-howl-devel is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065935" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065936" version="1" comment="avahi-lang is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065937" version="1" comment="avahi-utils is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065938" version="1" comment="avahi is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065939" version="1" comment="libavahi-client3-32bit is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065940" version="1" comment="libavahi-client3 is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065941" version="1" comment="libavahi-common3-32bit is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065942" version="1" comment="libavahi-common3 is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065943" version="1" comment="libavahi-core6 is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065944" version="1" comment="libavahi-devel is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065945" version="1" comment="libdns_sd-32bit is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065946" version="1" comment="libdns_sd is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065947" version="1" comment="libhowl0 is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065948" version="1" comment="python-avahi is &lt;0.6.25-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066416" version="1" comment="clamav-db is &lt;0.97-5.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066417" version="1" comment="clamav is &lt;0.97-5.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067045" version="1" comment="libcgroup-devel is &lt;0.36.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067046" version="1" comment="libcgroup1-32bit is &lt;0.36.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067047" version="1" comment="libcgroup1 is &lt;0.36.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069646" version="1" comment="kernel-debug-base is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069647" version="1" comment="kernel-debug-devel is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069648" version="1" comment="kernel-debug is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069649" version="1" comment="kernel-default-base is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069650" version="1" comment="kernel-default-devel is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069651" version="1" comment="kernel-default is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069652" version="1" comment="kernel-desktop-base is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069653" version="1" comment="kernel-desktop-devel is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069654" version="1" comment="kernel-desktop is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069655" version="1" comment="kernel-devel is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069656" version="1" comment="kernel-ec2-base is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069657" version="1" comment="kernel-ec2-devel is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069658" version="1" comment="kernel-ec2-extra is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069659" version="1" comment="kernel-ec2 is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069660" version="1" comment="kernel-pae-base is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069661" version="1" comment="kernel-pae-devel is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069662" version="1" comment="kernel-pae is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069663" version="1" comment="kernel-source-vanilla is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069664" version="1" comment="kernel-source is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069665" version="1" comment="kernel-syms is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069666" version="1" comment="kernel-trace-base is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069667" version="1" comment="kernel-trace-devel is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069668" version="1" comment="kernel-trace is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069669" version="1" comment="kernel-vanilla-base is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069670" version="1" comment="kernel-vanilla-devel is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069671" version="1" comment="kernel-vanilla is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069672" version="1" comment="kernel-vmi-base is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069673" version="1" comment="kernel-vmi-devel is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069674" version="1" comment="kernel-vmi is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069675" version="1" comment="kernel-xen-base is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069676" version="1" comment="kernel-xen-devel is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069677" version="1" comment="kernel-xen is &lt;2.6.34.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069678" version="1" comment="preload-kmp-default is &lt;1.1_k2.6.34.10_0.2-19.1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069679" version="1" comment="preload-kmp-desktop is &lt;1.1_k2.6.34.10_0.2-19.1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066627" version="1" comment="logwatch is &lt;7.3.6-73.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067749" version="1" comment="openldap2-back-meta is &lt;2.4.21-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067750" version="1" comment="openldap2-back-perl is &lt;2.4.21-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067751" version="1" comment="openldap2 is &lt;2.4.21-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070251" version="1" comment="ncpfs-32bit is &lt;2.2.6-166.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070252" version="1" comment="ncpfs-devel is &lt;2.2.6-166.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070253" version="1" comment="ncpfs is &lt;2.2.6-166.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072429" version="1" comment="finch-devel is &lt;2.7.9-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072430" version="1" comment="finch is &lt;2.7.9-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072431" version="1" comment="libpurple-devel is &lt;2.7.9-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072432" version="1" comment="libpurple-lang is &lt;2.7.9-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072433" version="1" comment="libpurple-meanwhile is &lt;2.7.9-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072434" version="1" comment="libpurple-mono is &lt;2.7.9-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072435" version="1" comment="libpurple-tcl is &lt;2.7.9-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072436" version="1" comment="libpurple is &lt;2.7.9-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072437" version="1" comment="pidgin-devel is &lt;2.7.9-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072438" version="1" comment="pidgin is &lt;2.7.9-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066851" version="1" comment="kdelibs4-branding-upstream is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066852" version="1" comment="kdelibs4-core is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066853" version="1" comment="kdelibs4-doc is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066854" version="1" comment="kdelibs4 is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066855" version="1" comment="libkde4-32bit is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066856" version="1" comment="libkde4-devel is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066857" version="1" comment="libkde4 is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066858" version="1" comment="libkdecore4-32bit is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066859" version="1" comment="libkdecore4-devel is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066860" version="1" comment="libkdecore4 is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066861" version="1" comment="libksuseinstall-devel is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066862" version="1" comment="libksuseinstall1-32bit is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066863" version="1" comment="libksuseinstall1 is &lt;4.4.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068333" version="1" comment="rsync is &lt;3.0.7-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068575" version="1" comment="logrotate is &lt;3.7.8-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066971" version="1" comment="wireshark-devel is &lt;1.4.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066948" version="1" comment="wireshark is &lt;1.4.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069043" version="1" comment="unixODBC-32bit is &lt;2.2.12-204.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069044" version="1" comment="unixODBC-devel-32bit is &lt;2.2.12-204.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069045" version="1" comment="unixODBC-devel is &lt;2.2.12-204.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069046" version="1" comment="unixODBC is &lt;2.2.12-204.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068666" version="1" comment="vm-install is &lt;0.4.30-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068667" version="1" comment="xen-devel is &lt;4.0.1_21326_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068668" version="1" comment="xen-doc-html is &lt;4.0.1_21326_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068669" version="1" comment="xen-doc-pdf is &lt;4.0.1_21326_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068670" version="1" comment="xen-kmp-default is &lt;4.0.1_21326_08_k2.6.34.8_0.2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068671" version="1" comment="xen-kmp-desktop is &lt;4.0.1_21326_08_k2.6.34.8_0.2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068672" version="1" comment="xen-kmp-pae is &lt;4.0.1_21326_08_k2.6.34.8_0.2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068673" version="1" comment="xen-libs is &lt;4.0.1_21326_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068674" version="1" comment="xen-tools-domU is &lt;4.0.1_21326_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068675" version="1" comment="xen-tools is &lt;4.0.1_21326_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068676" version="1" comment="xen is &lt;4.0.1_21326_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066988" version="1" comment="libvirt-client is &lt;0.8.1-4.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066989" version="1" comment="libvirt-devel is &lt;0.8.1-4.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066990" version="1" comment="libvirt-doc is &lt;0.8.1-4.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066991" version="1" comment="libvirt-python is &lt;0.8.1-4.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066992" version="1" comment="libvirt is &lt;0.8.1-4.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068441" version="1" comment="kdelibs4-branding-upstream is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068442" version="1" comment="kdelibs4-core is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068443" version="1" comment="kdelibs4-doc is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068444" version="1" comment="kdelibs4 is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068445" version="1" comment="libkde4-32bit is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068446" version="1" comment="libkde4-devel is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068447" version="1" comment="libkde4 is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068448" version="1" comment="libkdecore4-32bit is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068449" version="1" comment="libkdecore4-devel is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068450" version="1" comment="libkdecore4 is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068451" version="1" comment="libksuseinstall-devel is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068452" version="1" comment="libksuseinstall1-32bit is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068453" version="1" comment="libksuseinstall1 is &lt;4.4.4-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068694" version="1" comment="gimp-branding-upstream is &lt;2.6.8-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068695" version="1" comment="gimp-devel is &lt;2.6.8-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068696" version="1" comment="gimp-help-browser is &lt;2.6.8-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068697" version="1" comment="gimp-lang is &lt;2.6.8-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068698" version="1" comment="gimp-module-hal is &lt;2.6.8-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068699" version="1" comment="gimp-plugins-python is &lt;2.6.8-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068700" version="1" comment="gimp is &lt;2.6.8-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069434" version="1" comment="opera-gtk is &lt;11.50-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069435" version="1" comment="opera-kde4 is &lt;11.50-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069436" version="1" comment="opera is &lt;11.50-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071819" version="1" comment="acroread is &lt;9.4.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068576" version="1" comment="exim is &lt;4.71-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068577" version="1" comment="eximon is &lt;4.71-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068578" version="1" comment="eximstats-html is &lt;4.71-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068040" version="1" comment="libpolkit0-32bit is &lt;0.96-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068041" version="1" comment="libpolkit0 is &lt;0.96-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068042" version="1" comment="polkit-devel is &lt;0.96-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068043" version="1" comment="polkit-doc is &lt;0.96-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068044" version="1" comment="polkit is &lt;0.96-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067048" version="1" comment="libvirt-client is &lt;0.8.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067049" version="1" comment="libvirt-devel is &lt;0.8.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067050" version="1" comment="libvirt-doc is &lt;0.8.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067051" version="1" comment="libvirt-python is &lt;0.8.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067052" version="1" comment="libvirt is &lt;0.8.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068359" version="1" comment="otrs-doc is &lt;2.4.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068360" version="1" comment="otrs-itsm is &lt;2.1.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068361" version="1" comment="otrs is &lt;2.4.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068454" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.5-3.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068455" version="1" comment="libpython2_6-1_0 is &lt;2.6.5-3.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068456" version="1" comment="python-32bit is &lt;2.6.5-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068457" version="1" comment="python-base-32bit is &lt;2.6.5-3.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068458" version="1" comment="python-base is &lt;2.6.5-3.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068459" version="1" comment="python-curses is &lt;2.6.5-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068460" version="1" comment="python-demo is &lt;2.6.5-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068461" version="1" comment="python-devel is &lt;2.6.5-3.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068462" version="1" comment="python-gdbm is &lt;2.6.5-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068463" version="1" comment="python-idle is &lt;2.6.5-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068464" version="1" comment="python-tk is &lt;2.6.5-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068465" version="1" comment="python-xml is &lt;2.6.5-3.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068466" version="1" comment="python is &lt;2.6.5-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069520" version="1" comment="nagios-devel is &lt;3.2.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069521" version="1" comment="nagios-www is &lt;3.2.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069522" version="1" comment="nagios is &lt;3.2.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072352" version="1" comment="krb5-appl-clients is &lt;1.0-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072353" version="1" comment="krb5-appl-servers is &lt;1.0-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071563" version="1" comment="krb5-32bit is &lt;1.8.1-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071564" version="1" comment="krb5-appl-clients is &lt;1.0-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071565" version="1" comment="krb5-appl-servers is &lt;1.0-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071566" version="1" comment="krb5-client is &lt;1.8.1-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071567" version="1" comment="krb5-devel-32bit is &lt;1.8.1-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071568" version="1" comment="krb5-devel is &lt;1.8.1-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071569" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.8.1-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071570" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.8.1-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071571" version="1" comment="krb5-server is &lt;1.8.1-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071572" version="1" comment="krb5 is &lt;1.8.1-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067268" version="1" comment="libmodplug-devel is &lt;0.8.7-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067269" version="1" comment="libmodplug0-32bit is &lt;0.8.7-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067270" version="1" comment="libmodplug0 is &lt;0.8.7-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071733" version="1" comment="kernel-debug-base is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071734" version="1" comment="kernel-debug-devel is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071735" version="1" comment="kernel-debug is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071736" version="1" comment="kernel-default-base is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071737" version="1" comment="kernel-default-devel is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071738" version="1" comment="kernel-default is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071739" version="1" comment="kernel-desktop-base is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071740" version="1" comment="kernel-desktop-devel is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071741" version="1" comment="kernel-desktop is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071742" version="1" comment="kernel-devel is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071743" version="1" comment="kernel-ec2-base is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071744" version="1" comment="kernel-ec2-devel is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071745" version="1" comment="kernel-ec2-extra is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071746" version="1" comment="kernel-ec2 is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071747" version="1" comment="kernel-pae-base is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071748" version="1" comment="kernel-pae-devel is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071749" version="1" comment="kernel-pae is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071750" version="1" comment="kernel-source-vanilla is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071751" version="1" comment="kernel-source is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071752" version="1" comment="kernel-syms is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071753" version="1" comment="kernel-trace-base is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071754" version="1" comment="kernel-trace-devel is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071755" version="1" comment="kernel-trace is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071756" version="1" comment="kernel-vanilla-base is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071757" version="1" comment="kernel-vanilla-devel is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071758" version="1" comment="kernel-vanilla is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071759" version="1" comment="kernel-vmi-base is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071760" version="1" comment="kernel-vmi-devel is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071761" version="1" comment="kernel-vmi is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071762" version="1" comment="kernel-xen-base is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071763" version="1" comment="kernel-xen-devel is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071764" version="1" comment="kernel-xen is &lt;2.6.34.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071765" version="1" comment="preload-kmp-default is &lt;1.1_k2.6.34.10_0.4-19.1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071766" version="1" comment="preload-kmp-desktop is &lt;1.1_k2.6.34.10_0.4-19.1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068720" version="1" comment="wireshark-devel is &lt;1.4.4-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068718" version="1" comment="wireshark is &lt;1.4.4-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068546" version="1" comment="rdesktop is &lt;1.6.0-43.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068745" version="1" comment="libvmtools-devel is &lt;2011.05.27-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068746" version="1" comment="libvmtools0 is &lt;2011.05.27-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068747" version="1" comment="open-vm-tools-gui is &lt;2011.05.27-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068748" version="1" comment="open-vm-tools is &lt;2011.05.27-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068749" version="1" comment="vmware-guest-kmp-default is &lt;2011.05.27_k2.6.34.8_0.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068750" version="1" comment="vmware-guest-kmp-desktop is &lt;2011.05.27_k2.6.34.8_0.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068751" version="1" comment="vmware-guest-kmp-pae is &lt;2011.05.27_k2.6.34.8_0.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068370" version="1" comment="postfix-devel is &lt;2.7.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068371" version="1" comment="postfix-doc is &lt;2.7.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068372" version="1" comment="postfix-mysql is &lt;2.7.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068373" version="1" comment="postfix-postgresql is &lt;2.7.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068374" version="1" comment="postfix is &lt;2.7.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068510" version="1" comment="kvm is &lt;0.12.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070029" version="1" comment="libmodplug-devel is &lt;0.8.8.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070030" version="1" comment="libmodplug0-32bit is &lt;0.8.8.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070031" version="1" comment="libmodplug0 is &lt;0.8.8.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068628" version="1" comment="libmodplug-devel is &lt;0.8.8.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068629" version="1" comment="libmodplug0-32bit is &lt;0.8.8.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068630" version="1" comment="libmodplug0 is &lt;0.8.8.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068350" version="1" comment="exim is &lt;4.71-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068351" version="1" comment="eximon is &lt;4.71-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068352" version="1" comment="eximstats-html is &lt;4.71-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069771" version="1" comment="ecryptfs-utils-32bit is &lt;83-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069772" version="1" comment="ecryptfs-utils is &lt;83-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070032" version="1" comment="vm-install is &lt;0.4.31-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070033" version="1" comment="xen-devel is &lt;4.0.2_21511_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070034" version="1" comment="xen-doc-html is &lt;4.0.2_21511_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070035" version="1" comment="xen-doc-pdf is &lt;4.0.2_21511_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070036" version="1" comment="xen-kmp-default is &lt;4.0.2_21511_02_k2.6.34.10_0.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070037" version="1" comment="xen-kmp-desktop is &lt;4.0.2_21511_02_k2.6.34.10_0.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070038" version="1" comment="xen-kmp-pae is &lt;4.0.2_21511_02_k2.6.34.10_0.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070039" version="1" comment="xen-libs is &lt;4.0.2_21511_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070040" version="1" comment="xen-tools-domU is &lt;4.0.2_21511_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070041" version="1" comment="xen-tools is &lt;4.0.2_21511_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070042" version="1" comment="xen is &lt;4.0.2_21511_02-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068721" version="1" comment="bind-chrootenv is &lt;9.7.3P1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068722" version="1" comment="bind-devel is &lt;9.7.3P1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068723" version="1" comment="bind-doc is &lt;9.7.3P1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068724" version="1" comment="bind-libs-32bit is &lt;9.7.3P1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068725" version="1" comment="bind-libs is &lt;9.7.3P1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068726" version="1" comment="bind-utils is &lt;9.7.3P1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068727" version="1" comment="bind is &lt;9.7.3P1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069450" version="1" comment="cyrus-imapd-devel is &lt;2.3.16-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069451" version="1" comment="cyrus-imapd is &lt;2.3.16-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069452" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.16-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069453" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.16-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068579" version="1" comment="dovecot12-backend-mysql is &lt;1.2.17-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068580" version="1" comment="dovecot12-backend-pgsql is &lt;1.2.17-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068581" version="1" comment="dovecot12-backend-sqlite is &lt;1.2.17-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068582" version="1" comment="dovecot12-devel is &lt;1.2.17-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068583" version="1" comment="dovecot12-fts-lucene is &lt;1.2.17-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068584" version="1" comment="dovecot12-fts-solr is &lt;1.2.17-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068585" version="1" comment="dovecot12 is &lt;1.2.17-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069541" version="1" comment="libxml2-32bit is &lt;2.7.7-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069542" version="1" comment="libxml2-devel-32bit is &lt;2.7.7-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069543" version="1" comment="libxml2-devel is &lt;2.7.7-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069544" version="1" comment="libxml2-doc is &lt;2.7.7-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069545" version="1" comment="libxml2 is &lt;2.7.7-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068770" version="1" comment="libopenssl-devel is &lt;1.0.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068771" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068772" version="1" comment="libopenssl1_0_0 is &lt;1.0.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068773" version="1" comment="openssl-doc is &lt;1.0.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068774" version="1" comment="openssl is &lt;1.0.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069065" version="1" comment="libgnomesu-devel is &lt;1.0.0-322.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069066" version="1" comment="libgnomesu-lang is &lt;1.0.0-322.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069067" version="1" comment="libgnomesu0 is &lt;1.0.0-322.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069068" version="1" comment="libgnomesu is &lt;1.0.0-322.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070977" version="1" comment="wireshark-devel is &lt;1.4.4-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070963" version="1" comment="wireshark is &lt;1.4.4-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068742" version="1" comment="flash-player is &lt;10.3.181.22-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068815" version="1" comment="flash-player is &lt;10.3.181.26-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069765" version="1" comment="flash-player is &lt;10.3.183.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069231" version="1" comment="git-web is &lt;1.7.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069329" version="1" comment="tftp is &lt;0.48-108.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069749" version="1" comment="dbus-1-32bit is &lt;1.2.24-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069750" version="1" comment="dbus-1-devel-32bit is &lt;1.2.24-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069751" version="1" comment="dbus-1-devel-doc is &lt;1.2.24-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069752" version="1" comment="dbus-1-devel is &lt;1.2.24-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069753" version="1" comment="dbus-1 is &lt;1.2.24-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070978" version="1" comment="apache2-mod_php5 is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070979" version="1" comment="php5-bcmath is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070980" version="1" comment="php5-bz2 is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070981" version="1" comment="php5-calendar is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070982" version="1" comment="php5-ctype is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070983" version="1" comment="php5-curl is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070984" version="1" comment="php5-dba is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070985" version="1" comment="php5-devel is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070986" version="1" comment="php5-dom is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070987" version="1" comment="php5-enchant is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070988" version="1" comment="php5-exif is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070989" version="1" comment="php5-fastcgi is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070990" version="1" comment="php5-fileinfo is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070991" version="1" comment="php5-ftp is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070992" version="1" comment="php5-gd is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070993" version="1" comment="php5-gettext is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070994" version="1" comment="php5-gmp is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070995" version="1" comment="php5-hash is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070996" version="1" comment="php5-iconv is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070997" version="1" comment="php5-imap is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070998" version="1" comment="php5-intl is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070999" version="1" comment="php5-json is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071000" version="1" comment="php5-ldap is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071001" version="1" comment="php5-mbstring is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071002" version="1" comment="php5-mcrypt is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071003" version="1" comment="php5-mysql is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071004" version="1" comment="php5-odbc is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071005" version="1" comment="php5-openssl is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071006" version="1" comment="php5-pcntl is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071007" version="1" comment="php5-pdo is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071008" version="1" comment="php5-pear is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071009" version="1" comment="php5-pgsql is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071010" version="1" comment="php5-phar is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071011" version="1" comment="php5-posix is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071012" version="1" comment="php5-pspell is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071013" version="1" comment="php5-readline is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071014" version="1" comment="php5-shmop is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071015" version="1" comment="php5-snmp is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071016" version="1" comment="php5-soap is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071017" version="1" comment="php5-sockets is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071018" version="1" comment="php5-sqlite is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071019" version="1" comment="php5-suhosin is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071020" version="1" comment="php5-sysvmsg is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071021" version="1" comment="php5-sysvsem is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071022" version="1" comment="php5-sysvshm is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071023" version="1" comment="php5-tidy is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071024" version="1" comment="php5-tokenizer is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071025" version="1" comment="php5-wddx is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071026" version="1" comment="php5-xmlreader is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071027" version="1" comment="php5-xmlrpc is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071028" version="1" comment="php5-xmlwriter is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071029" version="1" comment="php5-xsl is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071030" version="1" comment="php5-zip is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071031" version="1" comment="php5-zlib is &lt;5.3.3-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070165" version="1" comment="tomcat6-admin-webapps is &lt;6.0.24-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070166" version="1" comment="tomcat6-docs-webapp is &lt;6.0.24-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070167" version="1" comment="tomcat6-el-1_0-api is &lt;6.0.24-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070168" version="1" comment="tomcat6-javadoc is &lt;6.0.24-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070169" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.24-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070170" version="1" comment="tomcat6-lib is &lt;6.0.24-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070171" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.24-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070172" version="1" comment="tomcat6-webapps is &lt;6.0.24-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070173" version="1" comment="tomcat6 is &lt;6.0.24-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068544" version="1" comment="kvm is &lt;0.12.5-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070632" version="1" comment="MozillaThunderbird-devel is &lt;3.1.15-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070633" version="1" comment="MozillaThunderbird-translations-common is &lt;3.1.15-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070634" version="1" comment="MozillaThunderbird-translations-other is &lt;3.1.15-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070635" version="1" comment="MozillaThunderbird is &lt;3.1.15-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070636" version="1" comment="enigmail is &lt;1.1.2+3.1.15-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072043" version="1" comment="seamonkey-dom-inspector is &lt;2.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072044" version="1" comment="seamonkey-irc is &lt;2.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072045" version="1" comment="seamonkey-translations-common is &lt;2.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072046" version="1" comment="seamonkey-translations-other is &lt;2.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072047" version="1" comment="seamonkey-venkman is &lt;2.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072048" version="1" comment="seamonkey is &lt;2.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070600" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.23-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070601" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.23-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070602" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.23-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070603" version="1" comment="MozillaFirefox is &lt;3.6.23-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070604" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070605" version="1" comment="mozilla-js192 is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070606" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070607" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070608" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070609" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070610" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070611" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070612" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070613" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070614" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070615" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.23-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070616" version="1" comment="seamonkey-dom-inspector is &lt;2.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070617" version="1" comment="seamonkey-irc is &lt;2.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070618" version="1" comment="seamonkey-translations-common is &lt;2.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070619" version="1" comment="seamonkey-translations-other is &lt;2.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070620" version="1" comment="seamonkey-venkman is &lt;2.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070621" version="1" comment="seamonkey is &lt;2.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070593" version="1" comment="flash-player is &lt;10.3.183.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072548" version="1" comment="acroread is &lt;9.4.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069362" version="1" comment="bind-chrootenv is &lt;9.7.3P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069363" version="1" comment="bind-devel is &lt;9.7.3P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069364" version="1" comment="bind-doc is &lt;9.7.3P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069365" version="1" comment="bind-libs-32bit is &lt;9.7.3P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069366" version="1" comment="bind-libs is &lt;9.7.3P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069367" version="1" comment="bind-utils is &lt;9.7.3P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069368" version="1" comment="bind is &lt;9.7.3P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070134" version="1" comment="libxcrypt-32bit is &lt;3.0.3-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070135" version="1" comment="libxcrypt-devel is &lt;3.0.3-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070136" version="1" comment="libxcrypt is &lt;3.0.3-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070137" version="1" comment="man-pages is &lt;3.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069896" version="1" comment="glibc-32bit is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069897" version="1" comment="glibc-devel-32bit is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069898" version="1" comment="glibc-devel is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069899" version="1" comment="glibc-html is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069900" version="1" comment="glibc-i18ndata is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069901" version="1" comment="glibc-info is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069902" version="1" comment="glibc-locale-32bit is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069903" version="1" comment="glibc-locale is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069904" version="1" comment="glibc-obsolete is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069905" version="1" comment="glibc-profile-32bit is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069906" version="1" comment="glibc-profile is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069907" version="1" comment="glibc is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069908" version="1" comment="libxcrypt-32bit is &lt;3.0.3-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069909" version="1" comment="libxcrypt-devel is &lt;3.0.3-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069910" version="1" comment="libxcrypt is &lt;3.0.3-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069911" version="1" comment="nscd is &lt;2.11.2-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069912" version="1" comment="pam-modules-32bit is &lt;11.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069913" version="1" comment="pam-modules is &lt;11.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069914" version="1" comment="pwdutils-plugin-audit is &lt;3.2.10-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069915" version="1" comment="pwdutils-rpasswd-32bit is &lt;3.2.10-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069916" version="1" comment="pwdutils-rpasswd is &lt;3.2.10-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069917" version="1" comment="pwdutils is &lt;3.2.10-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070084" version="1" comment="yast2-core-devel is &lt;2.19.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070085" version="1" comment="yast2-core is &lt;2.19.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072369" version="1" comment="nspluginwrapper is &lt;1.4.4.0.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069574" version="1" comment="opie-32bit is &lt;2.4-706.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069575" version="1" comment="opie is &lt;2.4-706.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069576" version="1" comment="permissions is &lt;2010.04.23.1140-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069773" version="1" comment="libvirt-client is &lt;0.8.1-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069774" version="1" comment="libvirt-devel is &lt;0.8.1-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069775" version="1" comment="libvirt-doc is &lt;0.8.1-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069776" version="1" comment="libvirt-python is &lt;0.8.1-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069777" version="1" comment="libvirt is &lt;0.8.1-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069523" version="1" comment="icedtea-web-javadoc is &lt;1.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069524" version="1" comment="icedtea-web is &lt;1.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070317" version="1" comment="ldapsmb is &lt;1.34b-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070318" version="1" comment="libldb-devel is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070319" version="1" comment="libldb0 is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070320" version="1" comment="libnetapi-devel is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070321" version="1" comment="libnetapi0 is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070322" version="1" comment="libsmbclient-devel is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070323" version="1" comment="libsmbclient0-32bit is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070324" version="1" comment="libsmbclient0 is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070325" version="1" comment="libsmbsharemodes-devel is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070326" version="1" comment="libsmbsharemodes0 is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070327" version="1" comment="libtalloc-devel is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070328" version="1" comment="libtalloc2 is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070329" version="1" comment="libtdb-devel is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070330" version="1" comment="libtdb1-32bit is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070331" version="1" comment="libtdb1 is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070332" version="1" comment="libtevent-devel is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070333" version="1" comment="libtevent0 is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070334" version="1" comment="libwbclient-devel is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070335" version="1" comment="libwbclient0-32bit is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070336" version="1" comment="libwbclient0 is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070337" version="1" comment="samba-32bit is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070338" version="1" comment="samba-client-32bit is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070339" version="1" comment="samba-client is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070340" version="1" comment="samba-devel is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070341" version="1" comment="samba-doc is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070342" version="1" comment="samba-krb-printing is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070343" version="1" comment="samba-winbind-32bit is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070344" version="1" comment="samba-winbind is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070345" version="1" comment="samba is &lt;3.5.4-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069743" version="1" comment="libsoup-2_4-1-32bit is &lt;2.30.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069744" version="1" comment="libsoup-2_4-1 is &lt;2.30.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071929" version="1" comment="wireshark-devel is &lt;1.4.10-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071930" version="1" comment="wireshark is &lt;1.4.10-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071032" version="1" comment="libreoffice-base-drivers-mysql is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071033" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071034" version="1" comment="libreoffice-base-extensions is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071035" version="1" comment="libreoffice-base is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071036" version="1" comment="libreoffice-branding-upstream is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071037" version="1" comment="libreoffice-calc-extensions is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071038" version="1" comment="libreoffice-calc is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071039" version="1" comment="libreoffice-converter is &lt;3.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071040" version="1" comment="libreoffice-draw-extensions is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071041" version="1" comment="libreoffice-draw is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071042" version="1" comment="libreoffice-filters-optional is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071043" version="1" comment="libreoffice-gnome is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071044" version="1" comment="libreoffice-help-cs is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071045" version="1" comment="libreoffice-help-da is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071046" version="1" comment="libreoffice-help-de is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071047" version="1" comment="libreoffice-help-en-GB is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071048" version="1" comment="libreoffice-help-en-US is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071049" version="1" comment="libreoffice-help-en-ZA is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071050" version="1" comment="libreoffice-help-es is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071051" version="1" comment="libreoffice-help-et is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071052" version="1" comment="libreoffice-help-fr is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071053" version="1" comment="libreoffice-help-gl is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071054" version="1" comment="libreoffice-help-gu-IN is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071055" version="1" comment="libreoffice-help-hi-IN is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071056" version="1" comment="libreoffice-help-hu is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071057" version="1" comment="libreoffice-help-it is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071058" version="1" comment="libreoffice-help-ja is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071059" version="1" comment="libreoffice-help-km is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071060" version="1" comment="libreoffice-help-ko is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071061" version="1" comment="libreoffice-help-nl is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071062" version="1" comment="libreoffice-help-pl is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071063" version="1" comment="libreoffice-help-pt-BR is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071064" version="1" comment="libreoffice-help-pt is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071065" version="1" comment="libreoffice-help-ru is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071066" version="1" comment="libreoffice-help-sl is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071067" version="1" comment="libreoffice-help-sv is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071068" version="1" comment="libreoffice-help-zh-CN is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071069" version="1" comment="libreoffice-help-zh-TW is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071070" version="1" comment="libreoffice-icon-theme-crystal is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071071" version="1" comment="libreoffice-icon-theme-galaxy is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071072" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071073" version="1" comment="libreoffice-icon-theme-oxygen is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071074" version="1" comment="libreoffice-icon-theme-tango is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071075" version="1" comment="libreoffice-icon-themes-prebuilt is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071076" version="1" comment="libreoffice-impress-extensions is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071077" version="1" comment="libreoffice-impress is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071078" version="1" comment="libreoffice-kde4 is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071079" version="1" comment="libreoffice-kde is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071080" version="1" comment="libreoffice-l10n-af is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071081" version="1" comment="libreoffice-l10n-ar is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071082" version="1" comment="libreoffice-l10n-be-BY is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071083" version="1" comment="libreoffice-l10n-bg is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071084" version="1" comment="libreoffice-l10n-br is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071085" version="1" comment="libreoffice-l10n-ca is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071086" version="1" comment="libreoffice-l10n-cs is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071087" version="1" comment="libreoffice-l10n-cy is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071088" version="1" comment="libreoffice-l10n-da is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071089" version="1" comment="libreoffice-l10n-de is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071090" version="1" comment="libreoffice-l10n-el is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071091" version="1" comment="libreoffice-l10n-en-GB is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071092" version="1" comment="libreoffice-l10n-en-ZA is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071093" version="1" comment="libreoffice-l10n-es is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071094" version="1" comment="libreoffice-l10n-et is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071095" version="1" comment="libreoffice-l10n-fi is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071096" version="1" comment="libreoffice-l10n-fr is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071097" version="1" comment="libreoffice-l10n-ga is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071098" version="1" comment="libreoffice-l10n-gl is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071099" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071100" version="1" comment="libreoffice-l10n-he is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071101" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071102" version="1" comment="libreoffice-l10n-hr is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071103" version="1" comment="libreoffice-l10n-hu is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071104" version="1" comment="libreoffice-l10n-it is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071105" version="1" comment="libreoffice-l10n-ja is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071106" version="1" comment="libreoffice-l10n-ka is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071107" version="1" comment="libreoffice-l10n-km is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071108" version="1" comment="libreoffice-l10n-ko is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071109" version="1" comment="libreoffice-l10n-lt is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071110" version="1" comment="libreoffice-l10n-mk is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071111" version="1" comment="libreoffice-l10n-nb is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071112" version="1" comment="libreoffice-l10n-nl is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071113" version="1" comment="libreoffice-l10n-nn is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071114" version="1" comment="libreoffice-l10n-nr is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071115" version="1" comment="libreoffice-l10n-pa-IN is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071116" version="1" comment="libreoffice-l10n-pl is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071117" version="1" comment="libreoffice-l10n-prebuilt is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071118" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071119" version="1" comment="libreoffice-l10n-pt is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071120" version="1" comment="libreoffice-l10n-ru is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071121" version="1" comment="libreoffice-l10n-rw is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071122" version="1" comment="libreoffice-l10n-sh is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071123" version="1" comment="libreoffice-l10n-sk is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071124" version="1" comment="libreoffice-l10n-sl is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071125" version="1" comment="libreoffice-l10n-sr is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071126" version="1" comment="libreoffice-l10n-ss is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071127" version="1" comment="libreoffice-l10n-st is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071128" version="1" comment="libreoffice-l10n-sv is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071129" version="1" comment="libreoffice-l10n-tg is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071130" version="1" comment="libreoffice-l10n-th is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071131" version="1" comment="libreoffice-l10n-tr is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071132" version="1" comment="libreoffice-l10n-ts is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071133" version="1" comment="libreoffice-l10n-uk is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071134" version="1" comment="libreoffice-l10n-ve is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071135" version="1" comment="libreoffice-l10n-vi is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071136" version="1" comment="libreoffice-l10n-xh is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071137" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071138" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071139" version="1" comment="libreoffice-l10n-zu is &lt;3.4.2.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071140" version="1" comment="libreoffice-languagetool-ca is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071141" version="1" comment="libreoffice-languagetool-de is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071142" version="1" comment="libreoffice-languagetool-en is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071143" version="1" comment="libreoffice-languagetool-es is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071144" version="1" comment="libreoffice-languagetool-fr is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071145" version="1" comment="libreoffice-languagetool-gl is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071146" version="1" comment="libreoffice-languagetool-it is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071147" version="1" comment="libreoffice-languagetool-nl is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071148" version="1" comment="libreoffice-languagetool-pl is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071149" version="1" comment="libreoffice-languagetool-ro is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071150" version="1" comment="libreoffice-languagetool-ru is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071151" version="1" comment="libreoffice-languagetool-sk is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071152" version="1" comment="libreoffice-languagetool-sv is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071153" version="1" comment="libreoffice-languagetool is &lt;1.4-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071154" version="1" comment="libreoffice-mailmerge is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071155" version="1" comment="libreoffice-math is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071156" version="1" comment="libreoffice-mono is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071157" version="1" comment="libreoffice-officebean is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071158" version="1" comment="libreoffice-openclipart is &lt;3.4-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071159" version="1" comment="libreoffice-pyuno is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071160" version="1" comment="libreoffice-testtool is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071161" version="1" comment="libreoffice-writer-extensions is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071162" version="1" comment="libreoffice-writer is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071163" version="1" comment="libreoffice is &lt;3.4.2.6-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069766" version="1" comment="foomatic-filters is &lt;4.0.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070043" version="1" comment="clamav-db is &lt;0.97.2-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070027" version="1" comment="clamav is &lt;0.97.2-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070455" version="1" comment="otrs-doc is &lt;2.4.11-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070456" version="1" comment="otrs-itsm is &lt;2.1.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070457" version="1" comment="otrs is &lt;2.4.11-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070458" version="1" comment="dhcp-client is &lt;4.1.2.ESV.1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070459" version="1" comment="dhcp-devel is &lt;4.1.2.ESV.1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070460" version="1" comment="dhcp-doc is &lt;4.1.2.ESV.1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070461" version="1" comment="dhcp-relay is &lt;4.1.2.ESV.1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070462" version="1" comment="dhcp-server is &lt;4.1.2.ESV.1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070463" version="1" comment="dhcp is &lt;4.1.2.ESV.1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072339" version="1" comment="FastCGI-devel is &lt;2.4.0-144.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072340" version="1" comment="FastCGI is &lt;2.4.0-144.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072341" version="1" comment="perl-FastCGI is &lt;2.4.0-144.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072468" version="1" comment="libxml2-32bit is &lt;2.7.7-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072469" version="1" comment="libxml2-devel-32bit is &lt;2.7.7-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072470" version="1" comment="libxml2-devel is &lt;2.7.7-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072471" version="1" comment="libxml2-doc is &lt;2.7.7-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072472" version="1" comment="libxml2 is &lt;2.7.7-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072049" version="1" comment="libpciaccess0-32bit is &lt;7.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072050" version="1" comment="libpciaccess0-devel is &lt;7.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072051" version="1" comment="libpciaccess0 is &lt;7.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072052" version="1" comment="xorg-x11-devel-32bit is &lt;7.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072053" version="1" comment="xorg-x11-devel is &lt;7.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072054" version="1" comment="xorg-x11-libs-32bit is &lt;7.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072055" version="1" comment="xorg-x11-libs is &lt;7.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071509" version="1" comment="gimp-branding-upstream is &lt;2.6.8-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071510" version="1" comment="gimp-devel is &lt;2.6.8-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071511" version="1" comment="gimp-help-browser is &lt;2.6.8-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071512" version="1" comment="gimp-lang is &lt;2.6.8-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071513" version="1" comment="gimp-module-hal is &lt;2.6.8-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071514" version="1" comment="gimp-plugins-python is &lt;2.6.8-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071515" version="1" comment="gimp is &lt;2.6.8-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072266" version="1" comment="python-cupshelpers is &lt;1.2.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072267" version="1" comment="system-config-printer-lang is &lt;1.2.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072268" version="1" comment="system-config-printer is &lt;1.2.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072269" version="1" comment="udev-configure-printer is &lt;1.2.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072482" version="1" comment="python-cupshelpers is &lt;1.2.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072483" version="1" comment="system-config-printer-lang is &lt;1.2.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072484" version="1" comment="system-config-printer is &lt;1.2.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072485" version="1" comment="udev-configure-printer is &lt;1.2.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071917" version="1" comment="icedtea-web-javadoc is &lt;1.1.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071918" version="1" comment="icedtea-web is &lt;1.1.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072025" version="1" comment="perl-32bit is &lt;5.12.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072026" version="1" comment="perl-base-32bit is &lt;5.12.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072027" version="1" comment="perl-base is &lt;5.12.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072028" version="1" comment="perl-doc is &lt;5.12.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072029" version="1" comment="perl is &lt;5.12.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072657" version="1" comment="ecryptfs-utils-32bit is &lt;83-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072658" version="1" comment="ecryptfs-utils is &lt;83-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070711" version="1" comment="librsvg-32bit is &lt;2.26.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070712" version="1" comment="librsvg-devel is &lt;2.26.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070713" version="1" comment="librsvg is &lt;2.26.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070714" version="1" comment="rsvg-view is &lt;2.26.3-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071164" version="1" comment="tomcat6-admin-webapps is &lt;6.0.24-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071165" version="1" comment="tomcat6-docs-webapp is &lt;6.0.24-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071166" version="1" comment="tomcat6-el-1_0-api is &lt;6.0.24-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071167" version="1" comment="tomcat6-javadoc is &lt;6.0.24-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071168" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.24-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071169" version="1" comment="tomcat6-lib is &lt;6.0.24-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071170" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.24-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071171" version="1" comment="tomcat6-webapps is &lt;6.0.24-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071172" version="1" comment="tomcat6 is &lt;6.0.24-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070269" version="1" comment="apache2-devel is &lt;2.2.15-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070270" version="1" comment="apache2-doc is &lt;2.2.15-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070271" version="1" comment="apache2-example-certificates is &lt;2.2.15-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070272" version="1" comment="apache2-example-pages is &lt;2.2.15-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070273" version="1" comment="apache2-itk is &lt;2.2.15-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070274" version="1" comment="apache2-prefork is &lt;2.2.15-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070275" version="1" comment="apache2-utils is &lt;2.2.15-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070276" version="1" comment="apache2-worker is &lt;2.2.15-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070277" version="1" comment="apache2 is &lt;2.2.15-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071702" version="1" comment="apache2-devel is &lt;2.2.15-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071703" version="1" comment="apache2-doc is &lt;2.2.15-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071704" version="1" comment="apache2-example-certificates is &lt;2.2.15-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071705" version="1" comment="apache2-example-pages is &lt;2.2.15-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071706" version="1" comment="apache2-itk is &lt;2.2.15-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071707" version="1" comment="apache2-prefork is &lt;2.2.15-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071708" version="1" comment="apache2-utils is &lt;2.2.15-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071709" version="1" comment="apache2-worker is &lt;2.2.15-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071710" version="1" comment="apache2 is &lt;2.2.15-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070910" version="1" comment="libQtWebKit-devel is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070911" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070912" version="1" comment="libQtWebKit4 is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070913" version="1" comment="libqt4-32bit is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070914" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070915" version="1" comment="libqt4-devel-doc is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070916" version="1" comment="libqt4-devel is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070917" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070918" version="1" comment="libqt4-qt3support is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070919" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070920" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070921" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070922" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070923" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070924" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070925" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070926" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070927" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070928" version="1" comment="libqt4-sql is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070929" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070930" version="1" comment="libqt4-x11 is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070931" version="1" comment="libqt4 is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070932" version="1" comment="qt4-x11-tools is &lt;4.6.3-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070464" version="1" comment="rsyslog-diag-tools is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070465" version="1" comment="rsyslog-doc is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070466" version="1" comment="rsyslog-module-gssapi is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070467" version="1" comment="rsyslog-module-gtls is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070468" version="1" comment="rsyslog-module-mysql is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070469" version="1" comment="rsyslog-module-pgsql is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070470" version="1" comment="rsyslog-module-relp is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070471" version="1" comment="rsyslog-module-snmp is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070472" version="1" comment="rsyslog-module-udpspoof is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070473" version="1" comment="rsyslog is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070474" version="1" comment="squid3 is &lt;3.0.STABLE25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071173" version="1" comment="libopenssl-devel is &lt;1.0.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071174" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8m-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071175" version="1" comment="libopenssl0_9_8 is &lt;0.9.8m-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071176" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071177" version="1" comment="libopenssl1_0_0 is &lt;1.0.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071178" version="1" comment="openssl-doc is &lt;1.0.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071179" version="1" comment="openssl is &lt;1.0.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070546" version="1" comment="cyrus-imapd-devel is &lt;2.3.16-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070547" version="1" comment="cyrus-imapd is &lt;2.3.16-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070548" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.16-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070549" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.16-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072293" version="1" comment="freetype2-devel-32bit is &lt;2.3.12-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072294" version="1" comment="freetype2-devel is &lt;2.3.12-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072295" version="1" comment="libfreetype6-32bit is &lt;2.3.12-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072296" version="1" comment="libfreetype6 is &lt;2.3.12-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071516" version="1" comment="quagga-devel is &lt;0.99.17-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071517" version="1" comment="quagga is &lt;0.99.17-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072166" version="1" comment="apache2-devel is &lt;2.2.15-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072167" version="1" comment="apache2-doc is &lt;2.2.15-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072168" version="1" comment="apache2-example-certificates is &lt;2.2.15-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072169" version="1" comment="apache2-example-pages is &lt;2.2.15-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072170" version="1" comment="apache2-itk is &lt;2.2.15-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072171" version="1" comment="apache2-prefork is &lt;2.2.15-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072172" version="1" comment="apache2-utils is &lt;2.2.15-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072173" version="1" comment="apache2-worker is &lt;2.2.15-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072174" version="1" comment="apache2 is &lt;2.2.15-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071573" version="1" comment="etherape is &lt;0.9.12-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071574" version="1" comment="cyrus-imapd-devel is &lt;2.3.16-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071575" version="1" comment="cyrus-imapd is &lt;2.3.16-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071576" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.16-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071577" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.16-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071649" version="1" comment="rpm-32bit is &lt;4.8.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071650" version="1" comment="rpm-devel is &lt;4.8.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071651" version="1" comment="rpm is &lt;4.8.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070505" version="1" comment="opera-gtk is &lt;11.51-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070506" version="1" comment="opera-kde4 is &lt;11.51-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070507" version="1" comment="opera is &lt;11.51-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071628" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b22.1.10.4-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071629" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b22.1.10.4-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071630" version="1" comment="java-1_6_0-openjdk-javadoc is &lt;1.6.0.0_b22.1.10.4-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071631" version="1" comment="java-1_6_0-openjdk-src is &lt;1.6.0.0_b22.1.10.4-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071632" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b22.1.10.4-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071633" version="1" comment="java-1_6_0-sun-alsa is &lt;1.6.0.u29-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071634" version="1" comment="java-1_6_0-sun-devel is &lt;1.6.0.u29-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071635" version="1" comment="java-1_6_0-sun-jdbc is &lt;1.6.0.u29-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071636" version="1" comment="java-1_6_0-sun-plugin is &lt;1.6.0.u29-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071637" version="1" comment="java-1_6_0-sun-src is &lt;1.6.0.u29-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071638" version="1" comment="java-1_6_0-sun is &lt;1.6.0.u29-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072303" version="1" comment="libfreebl3-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072304" version="1" comment="libfreebl3 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072305" version="1" comment="libsoftokn3-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072306" version="1" comment="libsoftokn3 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072307" version="1" comment="mozilla-nss-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072308" version="1" comment="mozilla-nss-certs-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072309" version="1" comment="mozilla-nss-certs is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072310" version="1" comment="mozilla-nss-devel is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072311" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072312" version="1" comment="mozilla-nss-sysinit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072313" version="1" comment="mozilla-nss-tools is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072314" version="1" comment="mozilla-nss is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071539" version="1" comment="libldns-devel is &lt;1.5.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071540" version="1" comment="libldns1 is &lt;1.5.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072056" version="1" comment="finch-devel is &lt;2.7.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072057" version="1" comment="finch is &lt;2.7.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072058" version="1" comment="libpurple-devel is &lt;2.7.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072059" version="1" comment="libpurple-lang is &lt;2.7.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072060" version="1" comment="libpurple-meanwhile is &lt;2.7.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072061" version="1" comment="libpurple-mono is &lt;2.7.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072062" version="1" comment="libpurple-tcl is &lt;2.7.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072063" version="1" comment="libpurple is &lt;2.7.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072064" version="1" comment="pidgin-devel is &lt;2.7.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072065" version="1" comment="pidgin is &lt;2.7.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071832" version="1" comment="radvd is &lt;1.3-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071578" version="1" comment="clamav-db is &lt;0.97.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071561" version="1" comment="clamav is &lt;0.97.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071931" version="1" comment="empathy-lang is &lt;2.30.1-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071932" version="1" comment="empathy is &lt;2.30.1-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071933" version="1" comment="nautilus-sendto-plugin-empathy is &lt;2.30.1-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071833" version="1" comment="libfreebl3-32bit is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071834" version="1" comment="libfreebl3 is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071835" version="1" comment="libsoftokn3-32bit is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071836" version="1" comment="libsoftokn3 is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071837" version="1" comment="mozilla-nss-32bit is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071838" version="1" comment="mozilla-nss-certs-32bit is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071839" version="1" comment="mozilla-nss-certs is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071840" version="1" comment="mozilla-nss-devel is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071841" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071842" version="1" comment="mozilla-nss-sysinit is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071843" version="1" comment="mozilla-nss-tools is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071844" version="1" comment="mozilla-nss is &lt;3.12.11-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071845" version="1" comment="MozillaFirefox-branding-openSUSE is &lt;3.5-17.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071846" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071847" version="1" comment="MozillaFirefox-translations-common is &lt;3.6.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071848" version="1" comment="MozillaFirefox-translations-other is &lt;3.6.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071849" version="1" comment="MozillaFirefox is &lt;3.6.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071850" version="1" comment="MozillaThunderbird-devel is &lt;3.1.16-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071851" version="1" comment="MozillaThunderbird-translations-common is &lt;3.1.16-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071852" version="1" comment="MozillaThunderbird-translations-other is &lt;3.1.16-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071853" version="1" comment="MozillaThunderbird is &lt;3.1.16-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071854" version="1" comment="enigmail is &lt;1.1.2+3.1.16-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071855" version="1" comment="mozilla-js192-32bit is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071856" version="1" comment="mozilla-js192 is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071857" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071858" version="1" comment="mozilla-xulrunner192-buildsymbols is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071859" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071860" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071861" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071862" version="1" comment="mozilla-xulrunner192-translations-common-32bit is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071863" version="1" comment="mozilla-xulrunner192-translations-common is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071864" version="1" comment="mozilla-xulrunner192-translations-other-32bit is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071865" version="1" comment="mozilla-xulrunner192-translations-other is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071866" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.24-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072315" version="1" comment="seamonkey-dom-inspector is &lt;2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072316" version="1" comment="seamonkey-irc is &lt;2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072317" version="1" comment="seamonkey-translations-common is &lt;2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072318" version="1" comment="seamonkey-translations-other is &lt;2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072319" version="1" comment="seamonkey-venkman is &lt;2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072320" version="1" comment="seamonkey is &lt;2.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071610" version="1" comment="puppet-server is &lt;0.25.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071611" version="1" comment="puppet is &lt;0.25.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072030" version="1" comment="puppet-server is &lt;0.25.4-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072031" version="1" comment="puppet is &lt;0.25.4-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072659" version="1" comment="libxml2-32bit is &lt;2.7.7-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072660" version="1" comment="libxml2-devel-32bit is &lt;2.7.7-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072661" version="1" comment="libxml2-devel is &lt;2.7.7-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072662" version="1" comment="libxml2-doc is &lt;2.7.7-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072663" version="1" comment="libxml2 is &lt;2.7.7-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072613" version="1" comment="libQtWebKit-devel is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072614" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072615" version="1" comment="libQtWebKit4 is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072616" version="1" comment="libqt4-32bit is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072617" version="1" comment="libqt4-devel is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072618" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072619" version="1" comment="libqt4-qt3support is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072620" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072621" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072622" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072623" version="1" comment="libqt4-sql is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072624" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072625" version="1" comment="libqt4-x11 is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072626" version="1" comment="libqt4 is &lt;4.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072370" version="1" comment="chasen-devel is &lt;2.4.2-60.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072371" version="1" comment="chasen is &lt;2.4.2-60.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072372" version="1" comment="perl-Text-ChaSen is &lt;2.4.2-60.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072066" version="1" comment="xorg-x11-Xvnc is &lt;7.5_1.8.0-10.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072067" version="1" comment="xorg-x11-server-extra is &lt;7.5_1.8.0-10.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072068" version="1" comment="xorg-x11-server-sdk is &lt;7.5_1.8.0-10.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072069" version="1" comment="xorg-x11-server is &lt;7.5_1.8.0-10.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072373" version="1" comment="net6-devel is &lt;1.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072374" version="1" comment="net6-lang is &lt;1.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072375" version="1" comment="net6 is &lt;1.3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071934" version="1" comment="libcap-devel is &lt;2.16-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071935" version="1" comment="libcap-progs is &lt;2.16-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071936" version="1" comment="libcap2-32bit is &lt;2.16-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071937" version="1" comment="libcap2 is &lt;2.16-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072495" version="1" comment="libopenssl-devel is &lt;1.0.0-6.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072496" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.0-6.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072497" version="1" comment="libopenssl1_0_0 is &lt;1.0.0-6.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072498" version="1" comment="openssl-doc is &lt;1.0.0-6.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072499" version="1" comment="openssl is &lt;1.0.0-6.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072664" version="1" comment="sysconfig is &lt;0.73.7-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071999" version="1" comment="bind-chrootenv is &lt;9.7.4P1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072000" version="1" comment="bind-devel is &lt;9.7.4P1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072001" version="1" comment="bind-doc is &lt;9.7.4P1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072002" version="1" comment="bind-libs-32bit is &lt;9.7.4P1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072003" version="1" comment="bind-libs is &lt;9.7.4P1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072004" version="1" comment="bind-utils is &lt;9.7.4P1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072005" version="1" comment="bind is &lt;9.7.4P1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072259" version="1" comment="namazu-cgi is &lt;2.0.20-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072260" version="1" comment="namazu-devel is &lt;2.0.20-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072261" version="1" comment="namazu is &lt;2.0.20-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072270" version="1" comment="jasper is &lt;1.900.1-141.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072271" version="1" comment="libjasper-32bit is &lt;1.900.1-141.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072272" version="1" comment="libjasper-devel is &lt;1.900.1-141.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072273" version="1" comment="libjasper is &lt;1.900.1-141.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072227" version="1" comment="dhcp-client is &lt;4.1.2.ESV.1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072228" version="1" comment="dhcp-devel is &lt;4.1.2.ESV.1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072229" version="1" comment="dhcp-doc is &lt;4.1.2.ESV.1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072230" version="1" comment="dhcp-relay is &lt;4.1.2.ESV.1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072231" version="1" comment="dhcp-server is &lt;4.1.2.ESV.1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072232" version="1" comment="dhcp is &lt;4.1.2.ESV.1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072189" version="1" comment="opera-gtk is &lt;11.60-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072190" version="1" comment="opera-kde4 is &lt;11.60-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072191" version="1" comment="opera is &lt;11.60-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072665" version="1" comment="tomcat6-admin-webapps is &lt;6.0.24-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072666" version="1" comment="tomcat6-docs-webapp is &lt;6.0.24-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072667" version="1" comment="tomcat6-el-1_0-api is &lt;6.0.24-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072668" version="1" comment="tomcat6-javadoc is &lt;6.0.24-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072669" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.24-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072670" version="1" comment="tomcat6-lib is &lt;6.0.24-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072671" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.24-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072672" version="1" comment="tomcat6-webapps is &lt;6.0.24-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072673" version="1" comment="tomcat6 is &lt;6.0.24-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040270"/>
	</rpminfo_test>
 </tests>
 <objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork4-filesharing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdnssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng14-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng14-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng14-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-sun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>viewvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-obsolete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-feedparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enigmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xpcom191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-js192-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-js192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-common-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-other-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-venkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-hash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>preload-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>preload-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-test-suite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tgt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-el-1_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-jsp-2_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-servlet-2_5-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-applets-gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdiplus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-certificates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-itk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-ijs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-itsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxsession</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-remote-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgamma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kio_kamera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kolourpaint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdcraw8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkexiv2-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksane-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksane0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ikev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ikev2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CGI-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvirc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>igerman98-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ispell-naustrian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ispell-ngerman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ispell-nswiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-artwork-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-components-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-components-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-components</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-converter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pa-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-hyphen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-crystal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-hicontrast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-oxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be-BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-extras-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-extras-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-languagetool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-libs-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-libs-core-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-libs-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-libs-extern-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-libs-extern-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-libs-extern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-libs-gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-libs-gui-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-libs-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-openclipart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-templates-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-templates-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-templates-labels-a4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-templates-labels-letter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-templates-presentation-layouts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-templates-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-testing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-testtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-de-AT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-de-CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-en-AU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-es-AR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-es-VE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-thesaurus-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-ure-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-ure-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-ure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-voikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-african</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-albanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-american</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-arabic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-assamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-asturian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-australian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-austrian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-belarusian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bengali</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-brazilian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-breton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-british</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-canadian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-chichewa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-croatian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-esperanto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-faroese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gaelic-scots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-galician</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gujarati</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-haitian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hebrew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hindi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hungarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-icelandic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-indonese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-khmer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kichwa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kikuyu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kinyarwanda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kiswahili</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-kurdish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-latvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lithuanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-macedonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-maithili</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-malagasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-malay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-malayalam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-maory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-marathi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-mexican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ndebele</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-new-zealand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-norsk-bokmaal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-norsk-nynorsk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nswiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-occitan-lengadocian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-persian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-portuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-romanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-setswana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-slovene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sotho-northern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-south-african-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-argentine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-bolivian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-chilean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-colombian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-costa-rican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-dominican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-ecuadorian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-guatemalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-honduran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-nicaraguan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-panamanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-paraguayan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-peruvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-puerto-rican</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-salvadorean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-uruguayan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish-venezuelan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-swati</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-swedish-finland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-tagalog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-tsonga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ukrainian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-venda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-welsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-xhosa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-zulu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-gui-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-libs-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX22-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>encfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot12-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot12-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot12-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot12-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot12-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclusterclient16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclusterclient_r16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-cluster-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-cluster-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-cluster-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-cluster-ndb-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-cluster-ndb-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-cluster-ndb-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-cluster-ndb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-cluster-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-cluster-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-cluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbclient16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbclient_r16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_fcgid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>festival-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>festival</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomboy-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomboy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monotone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-mkbaselibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmoon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmoon0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moonlight-desktop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moonlight-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moonlight-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moonlight-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>moonlight-web-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vm-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcollection-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcollection1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhash1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libini_config-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libini_config1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-browser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-module-hal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ConsoleKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-module-thai-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pure-ftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rdesktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vmware-guest-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vmware-guest-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vmware-guest-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils-plugin-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils-rpasswd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils-rpasswd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspluginwrapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>foomatic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpciaccess0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etherape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-sendto-plugin-empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chasen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chasen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Text-ChaSen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net6-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
 </objects>
 <states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.2-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-6.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-155.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.46-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b20.1.9.1-0.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u22-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-7.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.5-7.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.2-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.11-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.11-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.16-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.82.76-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.7.1P2-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.3-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-39.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.34.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1_k2.6.34.7_0.7-19.1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p249-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE6-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.60-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.8-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.8-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.6-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_k2.6.34.0_12-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-7.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.24-5.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2p7-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.5_1.8.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-8.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.2-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.86-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-1.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.4-2.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.15-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.15-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.17-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.15-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.17-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.12-7.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.71-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.70-15.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-15.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.2-5.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.1-4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.34.4-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1_k2.6.34.4_0.1-19.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-8.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.4-3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.15-5.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b18-1.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4-2.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.61-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.1-2.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.8-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.10-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.9-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.12.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.112-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-10.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.34.7-0.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1_k2.6.34.7_0.2-19.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.85.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.5-131.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1.2.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091006-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1.2-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1.2-2.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20110203.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1.2-2.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1.2-2.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-7.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3-1.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20071210.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20070913.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100126.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100307.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20061203.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20081215.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20051128.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20060111.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20050720.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100125.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20071002.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080319.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20081129.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080310.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20081206.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091015.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091130.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20081013.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100208.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080601.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20090624.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080701-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100316-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080110-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080201-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100111-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.01-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080813-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080822-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20090925-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091002-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20070816-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100125-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080515-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20041220-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20061015-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.06-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080914-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20090617-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100329-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20090823-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080805-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20081129-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091010-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20090218-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20040516-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100419-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20081204-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20051126-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100107-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.03-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20090808-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080630-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091210-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091103-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091030-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20080310-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20070815-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20081206-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091015-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091130-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20081013-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20061023-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100208-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20060123-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20051029-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100131-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20100130-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.02-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20090818-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20091031-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20040425-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1.4-2.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8m-3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-2.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.17-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.34.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1_k2.6.34.7_0.3-19.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2p7-2.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.34.7-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1_k2.6.34.7_0.4-19.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.34.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1_k2.6.34.7_0.5-19.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.12-7.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-5.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4-5.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4-5.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.STABLE25-2.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.2-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.14-6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1.90-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.3-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-180.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.1.P1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.7.1P2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.102.64-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.34.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1_k2.6.34.8_0.2-19.1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-5.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.3-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.3-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.24-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.12-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.25-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.55-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.57-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b20.1.9.2-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8m-3.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-101.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.5-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.34.10-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1_k2.6.34.10_0.6-19.1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.96-126.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.7-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.2-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48.1-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.24-5.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8m-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2010.07.28-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.27-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_02_k2.6.34.7_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.71-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b20.1.9.4-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.24-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.113-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u24-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b20.1.9.7-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.00-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.13-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-146.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.5-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.12.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8m-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.71-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b20.1.9.5-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.19-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.14-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.17-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.17-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.18-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.18-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.20-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.20-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2+3.1.12-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.2-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.12-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.29-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2.ESV.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.7.3-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.3-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.1-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.3-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.5-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.3-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.20-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.20-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.152.26-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.181.14-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.153.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.153.1-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.2.159.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.01-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u26-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b22.1.10.2-4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-61.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-61.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2.ESV.1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.11-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.25-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97-5.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.36.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.34.10-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1_k2.6.34.10_0.2-19.1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-73.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.21-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-166.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.8-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-204.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.30-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1_21326_08_k2.6.34.8_0.2-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.1-4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.50-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.71-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-3.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.7-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.34.10-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1_k2.6.34.10_0.4-19.1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-43.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2011.05.27-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2011.05.27_k2.6.34.8_0.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.71-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:83-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.31-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2_21511_02_k2.6.34.10_0.2-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.7.3P1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.16-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.17-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-322.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.181.22-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.181.26-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.183.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48-108.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.24-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.3-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.24-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.15-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2+3.1.15-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.23-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.23-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.183.10-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.7.3P3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.25-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.10-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4.0.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-706.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2010.04.23.1140-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.1-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2.6-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.2-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2.ESV.1-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-144.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.5-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.12.1-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:83-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.3-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.24-5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.15-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.15-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.0-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.STABLE25-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8m-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.16-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.12-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.17-1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.15-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.12-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.16-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.51-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b22.1.10.4-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.u29-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.1-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.11-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5-17.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.24-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.16-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2+3.1.16-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.25.4-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.25.4-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-60.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.5_1.8.0-10.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.73.7-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.7.4P1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.20-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-141.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2.ESV.1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.60-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.24-5.16.1</evr>
  </rpminfo_state>
 </states>
</oval_definitions>
