<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
        xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
        xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
        xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
        xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
        xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2015-11-16T04:02:19</oval:timestamp>
  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:1" version="1" class="patch">
	<metadata>
		<title>sudo: fixed two security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

  sudo was updated to fix two security issues, where adjusting the time of
  the syste could be used to regain access to sudo sessions if they onc were granted.
  (CVE-2013-1775,CVE-2013-1776)
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081493" comment="sudo-1.8.6p3-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081496" comment="sudo-devel-1.8.6p3-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2" version="1" class="patch">
	<metadata>
		<title>fix for remote stack overflow</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes a bug which allows an unauthenticated remote attacker
to cause a stack overflow in server code, resulting in either server
crash or even code execution as the user running firebird.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081497" comment="firebird-classic-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081500" comment="libfbembed-devel-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081501" comment="libfbembed2_5-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081503" comment="firebird-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081504" comment="firebird-32bit-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081508" comment="firebird-devel-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081509" comment="firebird-doc-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081510" comment="firebird-superserver-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081512" comment="libfbclient2-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081513" comment="libfbclient2-32bit-2.5.2.26539-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081516" comment="libfbclient2-devel-2.5.2.26539-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3" version="1" class="patch">
	<metadata>
		<title>wireshark: update to 1.8.6</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

  wireshark was updated to 1.8.6 [bnc#807942]
 + vulnerabilities fixed: 
   * The TCP dissector could crash.
     wnpa-sec-2013-10 CVE-2013-2475
   * The HART/IP dissectory could go into an infinite loop.
     wnpa-sec-2013-11 CVE-2013-2476
   * The CSN.1 dissector could crash.
     wnpa-sec-2013-12 CVE-2013-2477
   * The MS-MMS dissector could crash.
     wnpa-sec-2013-13 CVE-2013-2478
   * The MPLS Echo dissector could go into an infinite loop. 
     wnpa-sec-2013-14 CVE-2013-2479
   * The RTPS and RTPS2 dissectors could crash.
     wnpa-sec-2013-15 CVE-2013-2480
   * The Mount dissector could crash.
     wnpa-sec-2013-16 CVE-2013-2481
   * The AMPQ dissector could go into an infinite loop.
     wnpa-sec-2013-17 CVE-2013-2482
   * The ACN dissector could attempt to divide by zero.
     wnpa-sec-2013-18 CVE-2013-2483
   * The CIMD dissector could crash.
     wnpa-sec-2013-19 CVE-2013-2484
   * The FCSP dissector could go into an infinite loop.
     wnpa-sec-2013-20 CVE-2013-2485
   * The RELOAD dissector could go into an infinite loop.
     wnpa-sec-2013-21 CVE-2013-2486 CVE-2013-2487
   * The DTLS dissector could crash.
     wnpa-sec-2013-22 CVE-2013-2488 
  + Further bug fixes and updated protocol support as listed in:
    http://www.wireshark.org/docs/relnotes/wireshark-1.8.6.html
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081517" comment="wireshark-1.8.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081520" comment="wireshark-devel-1.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox: Updated to 19.0.2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Mozilla Firefox was updated to 19.0.2 (bnc#808243)
fixing:
* MFSA 2013-29/CVE-2013-0787 (bmo#848644)
  Use-after-free in HTML Editor could be used for code execution

* blocklist updates
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081521" comment="MozillaFirefox-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081522" comment="MozillaFirefox-branding-upstream-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081523" comment="MozillaFirefox-buildsymbols-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081526" comment="MozillaFirefox-devel-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081527" comment="MozillaFirefox-translations-common-19.0.2-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081528" comment="MozillaFirefox-translations-other-19.0.2-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5" version="1" class="patch">
	<metadata>
		<title>krb5: security fixes for PKINIT plugin</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

krb5 was updated to fix security issues in PKINIT:

- fix PKINIT null pointer deref in pkinit_check_kdc_pkid()
  (CVE-2012-1016 bnc#807556)

- fix PKINIT null pointer deref (CVE-2013-1415 bnc#806715)

Also package a missing file on 12.3 (bnc#794784).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081529" comment="krb5-doc-1.10.2-10.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081530" comment="krb5-mini-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081533" comment="krb5-mini-devel-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081534" comment="krb5-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081535" comment="krb5-32bit-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081536" comment="krb5-client-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081541" comment="krb5-devel-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081542" comment="krb5-devel-32bit-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081543" comment="krb5-plugin-kdb-ldap-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081545" comment="krb5-plugin-preauth-pkinit-1.10.2-10.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081547" comment="krb5-server-1.10.2-10.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:6" version="1" class="patch">
	<metadata>
		<title>xulrunner: security update to 17.0.4esr</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

xulrunner was updated to 17.0.4esr (bnc#808243)
to fix a important security issue:
* MFSA 2013-29/CVE-2013-0787 (bmo#848644)
  Use-after-free in HTML Editor
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081549" comment="mozilla-js-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081550" comment="mozilla-js-32bit-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081553" comment="xulrunner-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081554" comment="xulrunner-32bit-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081555" comment="xulrunner-buildsymbols-17.0.4-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081559" comment="xulrunner-devel-17.0.4-1.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:7" version="1" class="patch">
	<metadata>
		<title>PackageKit: only allow patches for regular updates</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The PackageKit zypp backend was fixed to only allow patches to be updated. Otherwise
a regular user could install new packages or even downgrade older packages to ones
with security problems. (CVE-2013-1764)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081561" comment="PackageKit-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081562" comment="PackageKit-backend-zypp-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081564" comment="PackageKit-branding-upstream-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081565" comment="PackageKit-browser-plugin-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081569" comment="PackageKit-devel-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081571" comment="PackageKit-gstreamer-plugin-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081573" comment="PackageKit-gtk3-module-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081575" comment="PackageKit-lang-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081576" comment="libpackagekit-glib2-16-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081577" comment="libpackagekit-glib2-16-32bit-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081580" comment="libpackagekit-glib2-devel-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081581" comment="libpackagekit-glib2-devel-32bit-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081582" comment="typelib-1_0-PackageKitGlib-1_0-0.8.7-4.8.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081583" comment="typelib-1_0-PackageKitPlugin-1_0-0.8.7-4.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:8" version="1" class="patch">
	<metadata>
		<title>seamonkey: update to 2.16.1</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
seamonkey was updated to version 2.16.1 fixing a severe security issue.

* MFSA 2013-29/CVE-2013-0787 (bmo#848644)
  Use-after-free in HTML Editor
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081584" comment="seamonkey-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081587" comment="seamonkey-dom-inspector-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081588" comment="seamonkey-irc-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081589" comment="seamonkey-translations-common-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081590" comment="seamonkey-translations-other-2.16.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081591" comment="seamonkey-venkman-2.16.1-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:9" version="1" class="patch">
	<metadata>
		<title>update for perl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Perl was updated to fix 3 security issues:

- fix rehash denial of service (compute time) [bnc#804415] [CVE-2013-1667]
- improve CGI crlf escaping [bnc#789994] [CVE-2012-5526]
- sanitize input in Maketext.pm to avoid code injection [bnc#797060] [CVE-2012-6329]

In openSUSE 12.1 also the following non-security bug was fixed:
- fix IPC::Open3 bug when '-' is used [bnc#755278]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081592" comment="perl-32bit-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081593" comment="perl-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081594" comment="perl-base-32bit-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081595" comment="perl-base-5.16.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081601" comment="perl-doc-5.16.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:10" version="1" class="patch">
	<metadata>
		<title>pidgin: 2.10.7 update to fix security issues and bugs</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Pidgin was updated to 2.10.7 to fix various security issues and the
bug that IRC did not work at all in 12.3.

Changes:
- Add pidgin-irc-sasl.patch: link irc module to SASL. Allows the
  IRC module to be loaded (bnc#806975).

- Update to version 2.10.7 (bnc#804742):
  + Alien hatchery:
    - No changes
  + General:
    - The configure script will now exit with status 1 when
      specifying invalid protocol plugins using the
      --with-static-prpls and --with-dynamic-prpls arguments.
     (pidgin.im#15316)
  + libpurple:
    - Fix a crash when receiving UPnP responses with abnormally
      long values. (CVE-2013-0274)
    - Don't link directly to libgcrypt when building with GnuTLS
      support. (pidgin.im#15329)
    - Fix UPnP mappings on routers that return empty &amp;lt;URLBase/&amp;gt;
      elements in their response. (pidgin.im#15373)
    - Tcl plugin uses saner, race-free plugin loading.
    - Fix the Tcl signals-test plugin for savedstatus-changed.
      (pidgin.im#15443)
  + Pidgin:
    - Make Pidgin more friendly to non-X11 GTK+, such as
      MacPorts' +no_x11 variant.
  + Gadu-Gadu:
    - Fix a crash at startup with large contact list. Avatar
      support for buddies will be disabled until 3.0.0.
      (pidgin.im#15226, pidgin.im#14305)
  + IRC:
    - Support for SASL authentication. (pidgin.im#13270)
    - Print topic setter information at channel join.
      (pidgin.im#13317)
  + MSN:
    - Fix SSL certificate issue when signing into MSN for some
      users.
    - Fix a crash when removing a user before its icon is loaded.
      (pidgin.im#15217)
  + MXit:
    - Fix a bug where a remote MXit user could possibly specify a
      local file path to be written to. (CVE-2013-0271)
    - Fix a bug where the MXit server or a man-in-the-middle could
      potentially send specially crafted data that could overflow
      a buffer and lead to a crash or remote code execution.
      (CVE-2013-0272)
    - Display farewell messages in a different colour to
      distinguish them from normal messages.
    - Add support for typing notification.
    - Add support for the Relationship Status profile attribute.
    - Remove all reference to Hidden Number.
    - Ignore new invites to join a GroupChat if you're already
      joined, or still have a pending invite.
    - The buddy's name was not centered vertically in the 
      buddy-list if they did not have a status-message or mood
      set.
    - Fix decoding of font-size changes in the markup of received
      messages.
    - Increase the maximum file size that can be transferred to
      1 MB.
    - When setting an avatar image, no longer downscale it to
      96x96.
  + Sametime:
    - Fix a crash in Sametime when a malicious server sends us an
      abnormally long user ID. (CVE-2013-0273)
  + Yahoo!:
    - Fix a double-free in profile/picture loading code.
      (pidgin.im#15053)
    - Fix retrieving server-side buddy aliases. (pidgin.im#15381)
  + Plugins:
    - The Voice/Video Settings plugin supports using the sndio
      GStreamer backends. (pidgin.im#14414)
    - Fix a crash in the Contact Availability Detection plugin.
      (pidgin.im#15327)
    - Make the Message Notification plugin more friendly to
      non-X11 GTK+, such as MacPorts' +no_x11 variant.
  + Windows-Specific Changes:
    - Compile with secure flags (pidgin.im#15290)
    - Installer downloads GTK+ Runtime and Debug Symbols more
      securely. (pidgin.im#15277)
    - Updates to a number of dependencies, some of which have
      security related fixes. (pidgin.im#14571, pidgin.im#15285,
      pidgin.im#15286)
      . ATK 1.32.0-2
      . Cyrus SASL 2.1.25
      . expat 2.1.0-1
      . freetype 2.4.10-1
      . gettext 0.18.1.1-2
      . Glib 2.28.8-1
      . libpng 1.4.12-1
      . libxml2 2.9.0-1
      . NSS 3.13.6 and NSPR 4.9.2
      . Pango 1.29.4-1
      . SILC 1.1.10
      . zlib 1.2.5-2
    - Patch libmeanwhile (sametime library) to fix crash.
      (pidgin.im#12637)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081602" comment="finch-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081604" comment="finch-devel-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081605" comment="libpurple-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081606" comment="libpurple-branding-upstream-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081608" comment="libpurple-devel-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081609" comment="libpurple-lang-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081610" comment="libpurple-meanwhile-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081612" comment="libpurple-tcl-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081614" comment="pidgin-2.10.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081617" comment="pidgin-devel-2.10.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:11" version="1" class="patch">
	<metadata>
		<title>openstack: Update to Folsom March 5th</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The Openstack Stack components were updated to Folsom level as of March 5th.

Changes in openstack-cinder:
- Update 12.3 packages to Folsom as of March 5th. This comes with
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- Update cinder-config-update.diff: update etc/cinder/api-paste.ini
  to have a signing_dir key under [filter:authtoken]. Otherwise,
  cinder-api won't start. This was done with commit de289a6 in
  Grizzly.

- Update to version 2012.2.4+git.1362502414.95a620b:
  + Check for non-default volume name template.
  + Fix error for extra specs update with empty body.

- Update to version 2012.2.4+git.1361527687.68de70d:
  + Add a safe_minidom_parse_string function. (CVE-2013-1664)

- Set auth_strategy to keystone for a good out-of-the-box experience
- Add cinder-config-update.diff: move configuration changes to a
  patch, instead of using sed.

- Update to version 2012.2.4+git.1360133755.a8caa79:
  + Final versioning for 2012.2.3
  + Bump version to 2012.2.4
  + Fix typo in cinder/db/api.py

- Update to version 2012.2.3+git.1358429029.cdf6c13:
  + Add commands used by NFS volume driver to rootwrap

Changes in openstack-dashboard:
- Update 12.3 packages to Folsom as of March 5th. This comes with 
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- Backport packaging changes we did for Grizzly to fix theming:
  + define a production %bcond_with that will determine whether
    offline compression is used or not.
  + if not using the production feature, have a nodejs Requires.
  + move compression steps to %prep.
  + by default, use the non-production mode for greater
    flexibility.
- Do not use &amp;quot;SUSE Cloud&amp;quot; as site branding: this is not SUSE Cloud.

- Update to version 2012.2.4+git.1362503968.8ece3c7:
  + pin django to 1.4.x stream

- Update to version 2012.2.4+git.1361527741.0a42fa0:
  + Prevent the user from creating a single IP address sized network
  + Add UTC offset information to the timezone

- Update to version 2012.2.4+git.1360133827.f421145:
  + Final versioning for 2012.2.3
  + Bump version to 2012.2.4

- Update to version 2012.2.2+git.1359111868.20fa0fc:
  + Pin docutils to 0.9.1, fix pep8 errors
  + Fix bug 1055929 - Can not display usage data for Quota Summary.
  + Revert &amp;quot;Temp fix for api/keystone.py&amp;quot;
  + Specify floating ips table action column's width
  + Allow setting nova quotas to unlimited
  + Add a check for unlimited quotas
  + Avoid cinder calls, when cinder is unavailable
  + Don't inherit from base.html in 500 error page
  + Don't show the EC2 Credentials panel if there is no EC2 service
- Drop horizon-ssl.patch: merged upstream.


Changes in openstack-glance:
- Do not return location in headers (CVE-2013-1840)
    - This fixes bnc#808626.

- Update 12.3 packages to Folsom as of March 5th. This comes with?
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- Update to version 2012.2.4+git.1362583521.1fb759d:
  + Swallow UserWarning from glance-cache-manage
  + Avoid dangling partial image on size/checksum mismatch

- Update to version 2012.2.4+git.1362503824.afe6166:
  + Fix broken JSON schemas in v2 tests
  + Prints list-cached dates in isoformat

- Update to version 2012.2.4+git.1360133885.98d9928:
  + Bump version to 2012.2.4

- Update to version 2012.2.3+git.1359529730.a5b0f4e:
  + Change useexisting to extend_existing to fix deprecation warnings.
  + Remove Swift location/password from messages. (CVE-2013-0212)

Changes in openstack-keystone:
- Update 12.3 packages to Folsom as of March 5th. This comes with?
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- fix logging.conf to be about keystone and have absolute path

- Update to version 2012.2.4+git.1362502288.8690166:
  + Sync timeutils to pick up normalize fix.
  + Backport of fix for 24-hour failure of pki.

- Update to version 2012.2.4+git.1361527873.37b3532:
  + Disable XML entity parsing (CVE-2013-1664, CVE-2013-1665)
  + Ensure user and tenant enabled in EC2 (CVE-2013-0282)

- Update to version 2012.2.4+git.1360133921.82c87e5:
  + Bump version to 2012.2.4
  + Add size validations for /tokens. (CVE-2013-0247)

- Update to version 2012.2.3+git.1359550485.ec7b94d:
  + Test 0.2.0 keystoneclient to avoid new deps
  + Unparseable endpoint URL's should raise friendly error
  + Fix catalog when services have no URL
  + Render content-type appropriate 404 (bug 1089987)

- fix last commit's hash tag in Version

Changes in openstack-nova:
- Add quotas for fixed ips. (CVE-2013-1838)

- Update to version 2012.2.3+git.1358515929.3545a7d:
  + Add NFS to the libvirt volume driver list
  + Call plug_vifs() for all instances in init_host
  + Fix addition of CPU features when running against legacy libvirt
  + Fix typo in resource tracker audit message
- Move back to &amp;quot;git_tarballs&amp;quot; source service.

- Start using obs-service-github_tarballs

- Update to version 2012.2.3+git.1358434328.a41b913:
  + Provide better error message for aggregate-create
  + Fix errors in used_limits extension
  + Add an iptables mangle rule per-bridge for DHCP.
  + Limit formatting routes when adding resources
- Update 12.3 packages to Folsom as of March 5th. This comes with?
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- Install polkit rules file in /usr/share/polkit-1/rules.d/ since
  it's not a configuration file, and use 10 instead of 50 as
  priority to make sure it is taken into account.

- Update to version 2012.2.4+git.1362583574.da38af5:
  + VNC Token Validation (CVE-2013-0335)

- Update to version 2012.2.4+git.1362502642.8c4df00:
  + Ensure we add a new line when appending to rc.local
  + Handle compute node not available for live migration
  + remove intermediate libvirt downloaded images

- Add openstack-nova-polkit.rules: polkit rules for the new polkit
  that uses javascript. On openSUSE 12.3 and later, we install this
  file in /etc/polkit-1/rules.d/ instead of installing the pkla
  file which is of no use with the new polkit.

- Update to version 2012.2.4+git.1361527907.d5e7f55:
  + Avoid stuck task_state on snapshot image failure
  + Add a safe_minidom_parse_string function. (CVE-2013-1664)
  + Enable libvirt to work with NoopFirewallDriver
  + Fix state sync logic related to the PAUSED VM state
  + libvirt: Fix nova-compute start when missing ip.

- Update to version 2012.2.4+git.1360133953.e5d0f4b:
  + Final versioning for 2012.2.3
  + Bump version to 2012.2.4

- Update to version 2012.2.3+git.1359529791.317cc0a:
  + remove session parameter from fixed_ip_get
  + Eliminate race conditions in floating association
  + Fix to include error message in instance faults
  + disallow boot from volume from specifying arbitrary volumes
    (CVE-2013-0208)

- Update to version 2012.2.3+git.1359111576.03c3e9b:
  + Ensure that Quantum uses configured fixed IP
  + Makes sure compute doesn't crash on failed resume.

- Update to version 2012.2.3+git.1358515929.3545a7d:
  + Add NFS to the libvirt volume driver list
  + Call plug_vifs() for all instances in init_host
  + Fix addition of CPU features when running against legacy libvirt
  + Fix typo in resource tracker audit message
- Move back to &amp;quot;git_tarballs&amp;quot; source service.

- Start using obs-service-github_tarballs

- Update to version 2012.2.3+git.1358434328.a41b913:
  + Provide better error message for aggregate-create
  + Fix errors in used_limits extension
  + Add an iptables mangle rule per-bridge for DHCP.
  + Limit formatting routes when adding resources

Changes in openstack-quantum:
- Update 12.3 packages to Folsom as of March 5th. This comes with?
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- Update to version 2012.2.4+git.1362583635.f94b149:
  + L3 port delete prevention: do not raise if no IP on port

- Update to version 2012.2.4+git.1362504084.06e42f8:
  + Close file descriptors when executing sub-processes
  + Persist updated expiration time

- Update to version 2012.2.4+git.1361527969.4de49b4:
  + only destroy single namespace if router_id is set
  + Enable OVS and NETNS utilities to perform logging
  + Disable dhcp_domain distribution when dhcp_domain is empty
  + Shorten the DHCP default resync_interval

- Update to version 2012.2.4+git.1360134016.d2a85e6:
  + Final versioning for 2012.2.3
  + Bump version to 2012.2.4

- Update to version 2012.2.3+git.1359529852.a84ba7e:
  + Regression caused by commit b56c2c998
  + LinuxBridge: update status according to admin_state_up
  + Ensure that correct root helper is used

Changes in openstack-quickstart:
- Update 12.3 packages to Folsom as of March 5th. This comes with?
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- Update to latest git (cb0fbe8):
  + Enalbe Cinder and Swift Service endpoints
  + Setup Cinder properly

- Update to latest git (95d7088):
  + Fill in values in the cinder/api-paste.ini templatae

Changes in openstack-swift:
- Update to version 1.7.4.1+git.1359529903.0ce3e1d:
  + Use pypi for python-swiftclient dependency.

- Update 12.3 packages to Folsom as of March 5th. This comes with?
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- Update to version 1.7.4.1+git.1359529903.0ce3e1d:
  + Use pypi for python-swiftclient dependency.

Changes in python-cinderclient:

- Update 12.3 packages to Folsom as of March 5th. This comes with?
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- Add compat-newer-requests.patch: take patches from upstream to
  allow working with newer versions of python-requests.

Changes in python-django_openstack_auth:
- Update 12.3 packages to Folsom as of March 5th. This comes with?
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- Update to version 1.0.6:
  + Fix compatibility with keystoneclient v0.2.
- Changes from version 1.0.5:
  + Improves error handling; fixes failing test.

Changes in python-keystoneclient:
- Update 12.3 packages to Folsom as of March 5th. This comes with?
  security fixes and bug fixes that we need to have OpenStack work
  nicely. Fix bnc#802278.

- Add compat-newer-requests.patch: take patches from upstream to
  allow working with newer versions of python-requests.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081618" comment="openstack-cinder-doc-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081619" comment="openstack-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081620" comment="openstack-cinder-api-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081621" comment="openstack-cinder-scheduler-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081622" comment="openstack-cinder-test-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081623" comment="openstack-cinder-volume-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081624" comment="python-cinder-2012.2.4+git.1362502414.95a620b-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081625" comment="openstack-dashboard-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081626" comment="openstack-dashboard-test-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081627" comment="python-horizon-2012.2.4+git.1362503968.8ece3c7-2.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081628" comment="openstack-glance-doc-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081629" comment="openstack-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081630" comment="openstack-glance-test-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081631" comment="python-glance-2012.2.4+git.1363297737.dd849a9-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081632" comment="openstack-keystone-doc-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081633" comment="openstack-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081634" comment="openstack-keystone-test-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081635" comment="python-keystone-2012.2.4+git.1362502288.8690166-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081636" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081637" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081638" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081639" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081640" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081641" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081642" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081643" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081644" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081645" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081646" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081647" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081648" comment="python-nova-2012.2.4+git.1363297910.9561484-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081649" comment="openstack-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081650" comment="openstack-quantum-doc-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081651" comment="openstack-quantum-test-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081652" comment="python-quantum-2012.2.4+git.1362583635.f94b149-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081653" comment="openstack-quickstart-2012.2+git.1360262230.cb0fbe8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081654" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081655" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081656" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081657" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081658" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081659" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081660" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081661" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081662" comment="python-cinderclient-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081663" comment="python-cinderclient-doc-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081664" comment="python-cinderclient-test-1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081665" comment="python-django_openstack_auth-1.0.6-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081666" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081667" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081668" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:12" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird: 17.0.4 release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
MozillaThunderbird was updated to 17.0.4 (bnc#808243)
* MFSA 2013-29/CVE-2013-0787 (bmo#848644)
  Use-after-free in HTML Editor
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081669" comment="MozillaThunderbird-17.0.4-61.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081670" comment="MozillaThunderbird-buildsymbols-17.0.4-61.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081673" comment="MozillaThunderbird-devel-17.0.4-61.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081675" comment="MozillaThunderbird-translations-common-17.0.4-61.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081676" comment="MozillaThunderbird-translations-other-17.0.4-61.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081677" comment="enigmail-1.5.1+17.0.4-61.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:13" version="1" class="patch">
	<metadata>
		<title>typo3-cms-4_5/typo3-cms-4_6/typo3-cms-4_7: security and bugfix updates</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The Typo3 CMS versions were updated to receive security and bug fixes.

- Raised to version 4.5.25

  * bugfix: External URL regression by jumpurl security fix (Helmut Hummel), t3#46071

- Raised to version 4.5.24
  * Raise submodule pointer (TYPO3 Release Team)
  * security: Open redirection with jumpurl (Franz G. Jahn), t3#28587, bnc#808528, CVE-2013-1843
  * bugfix: Check minitems for TCAtree (Georg Ringer), t3#25003
  * bugfix: Keep hyphens in custom HTML5 attributes (Jigal van Hemert), t3#34371
  * Revert &amp;quot;[BUGFIX] FE session records are never removed&amp;quot; (Oliver Hader), t3#45570
- security fix: Typo3 Extbase Framework SQL Injection, bnc#808528, CVE-2013-1842

- Raised to version 4.5.23
  * Raise submodule pointer
  * bugfix: t3lib_iconWorks must check if array exists before using it, t3#24248
  * bugfix: BE user switch impossible when in adminOnly mode, t3#32686
  * bugfix: Excludefieds must exclude admin only tables, t3#34460
  * bugfix: TypoLink: absolute urls when installed in subfolder, t3#33214
  * Raise submodule pointer
  * bugfix: [Cache][PDO] Duplicate cache entry possible, t3#34129
  * bugfix: IE9 compatibility clear cache menu, t3#36364
  * bugfix: Hook call modifyDBRow in ContentContentObject, t3#44416
  * bugfix: Fix misspelling in RTE meta menu, t3#43886
  * bugfix: load TCA before manipulation, t3#38505
  * DataHandler::getAutoVersionId() should be public, t3#45050
  * bugfix: Load date-time picker in scheduler module, t3#31027
  * bugfix: Quick Edit triggers warnings of missing key uid, t3#42845
  * Raise submodule pointer
  * bugfix: Fix warnings in em on tab Maintenance, t3#39680
  * bugfix: Correct TCA inclusion for uploads rendering, t3#44145
  * bugfix: Update description on changed error reporting defaults, t3#38240
  * bugfix: Fix typos in stdWrap_crop description, t3#43919
  * bugfix: Apc Cache backend has side effects, t3#38135
  * bugfix: Invalid call to t3lib_TCEmain::processRemapStack(), t3#44301
  * Raise submodule pointer
  * bugfix: Suggest wizard is behind form inputs, t3#42092
  * bugfix: phpdoc: $urlParameters can be a string, t3#44263
  * bugfix: FE session records are never removed, t3#34964
  * bugfix: INTincScript_loadJSCode() causes PHP warnings, t3#32278
  * bugfix: Enable the RTE with WebKit version 534 on iOS and Android, t3#43603
  * bugfix: Remove HTML in RuntimeException from sysext 'install', t3#38472
  * bugfix: Fix wrong column title in web&amp;gt;list for field colpos, t3#25113
  * bugfix: SqlParser: trim all kinds of whitespaces, t3#43470
  * Remove typo3.pageModule.js, t3#43459
  * bugfix: Installer: Reference images wrong, t3#42292
  * bugfix: Page Information shows incorrect number of total hits, t3#41608
  * bugfix: Old logo on &amp;quot;Install Tool is locked&amp;quot; page, t3#42908
  * openid: Update php-openid to 2.2.2, t3#42236
  * Group excludefields by table, t3#34098
  * bugfix: Hide version selector if workspaces are used, t3#43264
  * Raise submodule pointer

- Raised verstion to 4.6.18
  * bugfix: External URL regression by jumpurl security fix (Helmut Hummel), t3#46071

- Raised version to 4.6.17
  * Raise submodule pointer (TYPO3 Release Team)
  * security: Open redirection with jumpurl (Franz G. Jahn), t3#28587, bnc#808528, CVE-2013-1843
- security fix: Typo3 Extbase Framework SQL Injection, bnc#808528, CVE-2013-1842

- Raised version to 4.6.16
  * bugfix: L10n fallback does not work for TS labels, t3#44099
  * bugfix: L10n fallback does not work for ExtJS in BE, t3#44273
  * Raise submodule pointer
  * bugfix: Allow &amp;quot;en&amp;quot; as language key, t3#42084
  * Raise submodule pointer
  * bugfix: [Cache][PDO] Duplicate cache entry possible, t3#34129
  * bugfix: IE9 compatibility clear cache menu, t3#36364
  * bugfix: Hook call modifyDBRow in ContentContentObject, t3#44416
  * bugfix: Fix misspelling in RTE meta menu, t3#43886
  * bugfix: load TCA before manipulation, t3#38505
  * bugfix: add check for empty form values in FORM View, t3#28606
  * DataHandler::getAutoVersionId() should be public, t3#45050
  * bugfix: Quick Edit triggers warnings of missing key uid, t3#42845
  * Raise submodule pointer
  * bugfix: Fix warnings in em on tab Maintenance, t3#39680
  * bugfix: Correct TCA inclusion for uploads rendering, t3#44145
  * bugfix: Update description on changed error reporting defaults, t3#38240
  * bugfix: Fix typos in stdWrap_crop description, t3#43919
  * bugfix: Apc Cache backend has side effects, t3#38135
  * bugfix: Invalid call to t3lib_TCEmain::processRemapStack(), t3#44301
  * Raise submodule pointer
  * bugfix: Suggest wizard is behind form inputs, t3#42092
  * bugfix: phpdoc: $urlParameters can be a string, t3#44263
  * bugfix: FE session records are never removed, t3#34964
  * bugfix: INTincScript_loadJSCode() causes PHP warnings, t3#32278
  * bugfix: Fix broken logo file in Install Tool, t3#43426
  * bugfix: Remove HTML in RuntimeException from sysext 'install', t3#38472
  * bugfix: Fix wrong column title in web&amp;gt;list for field colpos, t3#25113
  * bugfix: SqlParser: trim all kinds of whitespaces, t3#43470
  * Remove typo3.pageModule.js, t3#43459
  * bugfix: Installer: Reference images wrong, t3#42292
  * bugfix: Page Information shows incorrect number of total hits, t3#41608
  * bugfix: Old logo on &amp;quot;Install Tool is locked&amp;quot; page, t3#42908
  * bugfix: Form values with newlines escaped in email, t3#32515
  * openid: Update php-openid to 2.2.2, t3#42236
  * bugfix: Wizard in HTML element moved to t3editor, t3#33813
  * bugfix: Livesearch toolbar should close others, t3#32890
  * bugfix: Hide version selector if workspaces are used, t3#43264
  * bugfix: Subject field in FormWizard, t3#35787
  * Raise submodule pointer
  * bugfix: Invalid behavior of search for integer in Backend search, t3#33700
  * fluid, bugfix: Unit test fails with broken timezone, t3#45285
  * fluid, bugfix: Date ViewHelper not using configured Timezones, t3#12769
  * fluid, bugfix: Fix typo and improve backup of system settings, t3#45218
  * fluid, bugfix: Remove PHP Error caused by setlocale call, t3#45118
  * fluid, bugfix: Incomplete locale backup in unit test, t3#44835
  * fluid, bugfix: selectViewHelper sorting should respect locales, t3#43445
  * fluid, bugfix: Image viewhelper clears $GLOBALS['TSFE'] in backend context, t3#43446
  * fluid, bugfix: AbstractFormFieldViewHelper always converts entities, t3#34091
  * linkvalidator, bugfix: SQL error in getLinkCounts, t3#43322
  * version, bugfix: Catchable fatal error when using the swap button, t3#42948

- Raised to version 4.7.10
  * bugfix: External URL regression by jumpurl security fix (Helmut Hummel), t3#46071

- Added rpmlintrc to suppress duplicated files warning. 

- Raised to version 4.7.9
  * Raise submodule pointer (TYPO3 Release Team)
  * security: Open redirection with jumpurl (Franz G. Jahn), t3#28587, bnc#808528, CVE-2013-1843
  * bugfix: Invalid RSA key when submitting form twice (Benjamin Mack), t3#40085
- security fix: Typo3 Extbase Framework SQL Injection, bnc#808528, CVE-2013-1842

- Raised to version 4.7.8
  * bugfix: L10n fallback does not work for TS labels, t3#44099
  * bugfix: L10n fallback does not work for ExtJS in BE, t3#44273
  * Raise submodule pointer
  * bugix: Allow &amp;quot;en&amp;quot; as language key, t3#42084
  * Raise submodule pointer
  * bugfix: [Cache][PDO] Duplicate cache entry possible, t3#34129
  * bugfix: IE9 compatibility clear cache menu, t3#36364
  * bugfix: Hook call modifyDBRow in ContentContentObject, t3#44416
  * bugfix: Fix misspelling in RTE meta menu, t3#43886
  * bugfix: load TCA before manipulation, t3#38505
  * bugfix: add check for empty form values in FORM View, t3#28606
  * DataHandler::getAutoVersionId() should be public, t3#45050
  * bugfix: Possible warning in about module, t3#44892
  * bugfix: Quick Edit triggers warnings of missing key uid, t3#42845
  * Raise submodule pointer
  * bugfix: Fix warnings in em on tab Maintenance, t3#39680
  * bugfix: EXT:felogin: Multiple bugs with preserveGETvars, t3#19938
  * bugfix: Correct TCA inclusion for uploads rendering, t3#44145
  * bugfix: array_merge_recursive_overrule: __UNSET for array values, t3#43874
  * bugfix: Update description on changed error reporting defaults, t3#38240
  * bugfix: Fix typos in stdWrap_crop description, t3#43919
  * Add save only button to Scheduler task, t3#44152
  * bugfix: Apc Cache backend has side effects, t3#38135
  * bugfix: Invalid call to t3lib_TCEmain::processRemapStack(), t3#44301
  * Raise submodule pointer
  * Suggest wizard is behind form inputs, t3#42092
  * bugfix: phpdoc: $urlParameters can be a string, t3#44263
  * bugfix: FE session records are never removed, t3#34964
  * bugfix: INTincScript_loadJSCode() causes PHP warnings, t3#32278
  * bugfix: Fix broken logo file in Install Tool, t3#43426
  * bugfix: Enable the RTE with WebKit version 534 on iOS and Android, t3#43603
  * bugfix: IE9 crashes after saving with RTE, t3#43766
  * bugfix: Remove HTML in RuntimeException from sysext 'install', t3#38472
  * bugfix: Compatibility fix for get_html_translation_table(), t3#39287
  * bugfix: Fix wrong column title in web&amp;gt;list for field colpos, t3#25113
  * bugfix: SqlParser: trim all kinds of whitespaces, t3#43470
  * Remove typo3.pageModule.js, t3#43459
  * bugfix: Installer: Reference images wrong, t3#42292
  * bugfix: Page Information shows incorrect number of total hits, t3#41608
  * bugfix: Old logo on &amp;quot;Install Tool is locked&amp;quot; page, t3#42908
  * bugfix: Form values with newlines escaped in email, t3#32515
  * openid: Update php-openid to 2.2.2, t3#42236
  * bugfix: Hide version selector if workspaces are used. t3#43264
  * bugfix: Subject field in FormWizard, t3#35787
  * Raise submodule pointer
  * Invalid behavior of search for integer in Backend search, t3#33700
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081679" comment="typo3-cms-4_5-4.5.25-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081680" comment="typo3-cms-4_6-4.6.18-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081681" comment="typo3-cms-4_7-4.7.10-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:14" version="1" class="patch">
	<metadata>
		<title>nss-pam-ldapd: fixed FD_SET overflow</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

nss-pam-ldap was updated to fix a FD_SET overflow, happening when
more than 1024 filedescriptors are opened. (CVE-2013-0288)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081682" comment="nss-pam-ldapd-0.8.10-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081683" comment="nss-pam-ldapd-32bit-0.8.10-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:15" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk: icedtea 2.3.7 update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

java-1_7_0-openjdk was updated to icedtea-2.3.7 (bnc#809386):
* Security fixes
  - S8007014, CVE-2013-0809: Improve image handling
  - S8007675, CVE-2013-1493: Improve color conversion
* Backports
  - S8002344: Krb5LoginModule config class does not return proper KDC list from DNS
  - S8004344: Fix a crash in ToolkitErrorHandler() in XlibWrapper.c
  - S8006179: JSR292 MethodHandles lookup with interface using findVirtual()
  - S8006882: Proxy generated classes in sun.proxy package breaks JMockit
* Bug fixes
  - PR1303: Correct #ifdef to #if
  - PR1340: Simplify the rhino class rewriter to avoid use of concurrency
  - Revert 7017193 and add the missing free call, until a better fix is ready.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081687" comment="java-1_7_0-openjdk-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081690" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081692" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081694" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081695" comment="java-1_7_0-openjdk-src-1.7.0.6-8.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:16" version="1" class="patch">
	<metadata>
		<title>telepathy-gabble: fixed a remote denial of service</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

telepathy-gabble was updated to fix a remote denial of service attack using NULL ptr dereferences
during hashing. (CVE-2013-1769).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081696" comment="telepathy-gabble-0.17.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081699" comment="telepathy-gabble-xmpp-console-0.17.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:17" version="1" class="patch">
	<metadata>
		<title>libxml2: fixed two entity expansion problems</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

libxml2 was updated to limit internal entity expansion denial of service problems (IXE)
(CVE-2013-0338) (bnc#805233)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081701" comment="libxml2-2-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081702" comment="libxml2-2-32bit-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081705" comment="libxml2-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081707" comment="libxml2-devel-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081708" comment="libxml2-devel-32bit-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081709" comment="libxml2-doc-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081710" comment="libxml2-tools-2.9.0-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081712" comment="python-libxml2-2.9.0-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:18" version="1" class="patch">
	<metadata>
		<title>almanah: encrypt database when app closes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Almanah was updated to encrypt the database when the application closes.
    (bgo#695117, bnc#809140, CVE-2013-1853).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081715" comment="almanah-0.10.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081718" comment="almanah-lang-0.10.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:19" version="1" class="patch">
	<metadata>
		<title>privoxy: update to 3.0.21 to fix security issues and bugs</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

privoxy was updated to 3.0.21 stable fo fix CVE-2013-2503 (bnc#809123)
- changes in 3.0.21
 * On POSIX-like platforms, network sockets with file descriptor
    values above FD_SETSIZE are properly rejected. Previously they
    could cause memory corruption in configurations that allowed
    the limit to be reached.
 * Proxy authentication headers are removed unless the new directive
    enable-proxy-authentication-forwarding is used. Forwarding the
    headers potentionally allows malicious sites to trick the user
    into providing them with login information.
    Reported by Chris John Riley.
 * Compiles on OS/2 again now that unistd.h is only included
    on platforms that have it.
 * The show-status page shows the FEATURE_STRPTIME_SANITY_CHECKS status.
 * A couple of assert()s that could theoretically dereference
    NULL pointers in debug builds have been relocated.
 * Added an LSB info block to the generic start script.
    Based on a patch from Natxo Asenjo.
 * The max-client-connections default has been changed to 128
    which should be more than enough for most setups.
 * Block rover.ebay./ar.*\&amp;amp;adtype= instead of &amp;quot;/.*\&amp;amp;adtype=&amp;quot; which
    caused too man false positives.
    Reported by u302320 in #360284, additional feedback from Adam Piggott.
 * Unblock '.advrider.com/' and '/.*ADVrider'.
    Anonymously reported in #3603636.
 * Stop blocking '/js/slider\.js'.
    Reported by Adam Piggott in #3606635 and _lvm in #2791160.
 * Added an iframes filter.
 * The whole GPLv2 text is included in the user manual now,
    so Privoxy can serve it itself and the user can read it
    without having to wade through GPLv3 ads first.
 * Properly numbered and underlined a couple of section titles
    in the config that where previously overlooked due to a flaw
    in the conversion script. Reported by Ralf Jungblut.
 * Improved the support instruction to hopefully make it harder to
    unintentionally provide insufficient information when requesting
    support. Previously it wasn't obvious that the information we need
    in bug reports is usually also required in support requests.
 * Removed documentation about packages that haven't been provided
    in years.
 * Only log the test number when not running in verbose mode
    The position of the test is rarely relevant and it previously
- for full list of changes see ChangeLog file shipped together with
  this package
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009079318" comment="privoxy-3.0.21-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009079321" comment="privoxy-doc-3.0.21-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20" version="1" class="patch">
	<metadata>
		<title>ImageMagick: integer overflow fixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

ImageMagick received fixes for a overflow in *png_malloc functions. (CVE-2012-3437)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081719" comment="ImageMagick-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081722" comment="ImageMagick-devel-32bit-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081723" comment="ImageMagick-devel-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081724" comment="ImageMagick-doc-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081725" comment="ImageMagick-extra-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081727" comment="libMagick++-devel-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081728" comment="libMagick++5-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081730" comment="libMagickCore5-32bit-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081731" comment="libMagickCore5-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081734" comment="libMagickWand5-32bit-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081735" comment="libMagickWand5-6.7.8.8-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081738" comment="perl-PerlMagick-6.7.8.8-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:21" version="1" class="patch">
	<metadata>
		<title>GraphicsMagick: fixed integer overflows</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

GraphicsMagick was updated to fix integer overflows in the _png_malloc
functions (CVE-2012-3438).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081740" comment="GraphicsMagick-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081743" comment="GraphicsMagick-devel-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081744" comment="libGraphicsMagick++-devel-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081745" comment="libGraphicsMagick++3-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081747" comment="libGraphicsMagick3-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081749" comment="libGraphicsMagickWand2-1.3.17-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081751" comment="perl-GraphicsMagick-1.3.17-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:22" version="1" class="patch">
	<metadata>
		<title>pigz: fixed unpacking permissions</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

pigz incorrectly used world writeable permissions during unpacking (CVE-2013-0296).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081753" comment="pigz-2.2.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:23" version="1" class="patch">
	<metadata>
		<title>sssd: fixed some access control management issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

When SSSD is configured as an Active Directory client by using the
new Active Directory provider or equivalent configuration of the LDAP
provider, the Simple Access Provider does not handle access control
correctly. If any groups are specified with the simple_deny_groups
option, the group members are permitted access. (CVE-2013-0287)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081756" comment="libipa_hbac-devel-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081757" comment="libipa_hbac0-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081759" comment="libsss_idmap-devel-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081760" comment="libsss_idmap0-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081762" comment="libsss_sudo-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081764" comment="python-ipa_hbac-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081766" comment="python-sssd-config-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081768" comment="sssd-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081769" comment="sssd-32bit-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081773" comment="sssd-ipa-provider-1.9.4-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081775" comment="sssd-tools-1.9.4-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:24" version="1" class="patch">
	<metadata>
		<title>clamav: 0.97.7 update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

clamav was updated to version 0.97.7 (bnc#809945)
and contains several hardening fixes which might be security issues.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081777" comment="clamav-0.97.7-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:25" version="1" class="patch">
	<metadata>
		<title>openstack-keystone: fixed validation from backend</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Openstack keystone was updated to version 2012.2.4+git.1363796849.255b1d4:
  + validate from backend (lp#1129713, bnc#809590, CVE-2013-1865)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081780" comment="openstack-keystone-doc-2012.2.4+git.1363796849.255b1d4-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081781" comment="openstack-keystone-2012.2.4+git.1363796849.255b1d4-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081782" comment="openstack-keystone-test-2012.2.4+git.1363796849.255b1d4-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081783" comment="python-keystone-2012.2.4+git.1363796849.255b1d4-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:26" version="1" class="patch">
	<metadata>
		<title>ruby: update to fix XML and JSON security problems</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Ruby 1.8 was updated to fix a XML entity expansion denial of service attack (CVE-2013-1821)

Ruby 1.9 was updated to 1.9.3 p392, fixing the same security issues and also:
  - update json intree to 1.5.5:
    Denial of Service and Unsafe Object Creation Vulnerability in
    JSON CVE-2013-0269
  - limit entity expansion text limit to 10kB CVE-2013-1821
  - get rid of a SEGV when calling rb_iter_break() from some
    extention libraries.
  - some warning suppressed and smaller fixes
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081784" comment="ruby-1.9.3-15.2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081785" comment="ruby-devel-1.9.3-15.2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081786" comment="ruby19-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081789" comment="ruby19-devel-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081790" comment="ruby19-devel-extra-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081791" comment="ruby19-doc-ri-1.9.3.p392-1.5.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081792" comment="ruby19-tk-1.9.3.p392-1.5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:27" version="1" class="patch">
	<metadata>
		<title>fail2ban: fixed a startup and security issue</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

  This update of fail2ban fixes a startup related startup-problem and a security problem fixed upstream (CVE-2012-5642).
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081794" comment="fail2ban-0.8.8-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:28" version="1" class="patch">
	<metadata>
		<title>libxslt: fixed denial of service problems</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Two denial of service problems (crashes with NULL pointer derference) were fixed in libxslt,
which could potentially be used by remote attackers to crash libxslt using programs.
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081795" comment="libxslt-python-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081798" comment="libxslt-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081800" comment="libxslt-devel-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081801" comment="libxslt-devel-32bit-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081802" comment="libxslt-tools-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081804" comment="libxslt1-1.1.28-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081805" comment="libxslt1-32bit-1.1.28-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:29" version="1" class="patch">
	<metadata>
		<title>puppet: security fixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Various security issues were fixed in puppet.

CVE-2013-1655 CVE-2013-2275 CVE-2013-1640
CVE-2013-1652 CVE-2013-1653 CVE-2013-1654
CVE-2013-1655 CVE-2013-2274 CVE-2013-2275
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081808" comment="puppet-3.0.2-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081809" comment="puppet-server-3.0.2-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:30" version="1" class="patch">
	<metadata>
		<title>bind: update to 9.9.2-P2 security release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

bind was updated to 9.9.2-P2, fixing a security issue in regular 
expression handling. [CVE-2013-2266] [RT #32688]
https://kb.isc.org/article/AA-00871 (bnc#811876)
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081810" comment="bind-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081811" comment="bind-chrootenv-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081814" comment="bind-devel-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081815" comment="bind-doc-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081816" comment="bind-libs-32bit-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081817" comment="bind-libs-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081820" comment="bind-lwresd-9.9.2P2-2.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081822" comment="bind-utils-9.9.2P2-2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:31" version="1" class="patch">
	<metadata>
		<title>dhcp: fixed denial of service via regular expressions</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

ISC DHCP was updated to ISC dhcp-4.2.5-P1 release, which contains updated
bind-9.8.4-P2 sources with removed regex.h check in configure
(bnc#811934, CVE-2013-2266).

Also:
Changed spec make the bind export library build output visible.
Added dhcp6-server service template for SuSEfirewall2 (bnc#783002)
Update config.guess/sub for aarch64
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081824" comment="dhcp-4.2.5.P1-0.2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081825" comment="dhcp-client-4.2.5.P1-0.2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081829" comment="dhcp-devel-4.2.5.P1-0.2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081830" comment="dhcp-doc-4.2.5.P1-0.2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081831" comment="dhcp-relay-4.2.5.P1-0.2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081833" comment="dhcp-server-4.2.5.P1-0.2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:32" version="1" class="patch">
	<metadata>
		<title>jakarta-commons-httpclient: enhance SSL checks also for subjectAltNames</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

jakarta-commons-httpclient was updated to enhance the fix of bnc#803332 / CVE-2012-5783
* also check for subjectAltNames in the certificate.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081835" comment="jakarta-commons-httpclient-3.1-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081836" comment="jakarta-commons-httpclient-demo-3.1-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081837" comment="jakarta-commons-httpclient-javadoc-3.1-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081838" comment="jakarta-commons-httpclient-manual-3.1-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:33" version="1" class="patch">
	<metadata>
		<title>apache2: security and bugfixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

apache2 was updated to fix:

- fix for cross site scripting vulnerability in mod_balancer. This is
  CVE-2012-4558 [bnc#807152]
- fixes for low profile cross site scripting vulnerabilities,
  known as CVE-2012-3499 [bnc#806458]

- Escape filename for the case that uploads are allowed with untrusted
  user's control over filenames and mod_negotiation enabled on the
  same directory. CVE-2012-2687 [bnc#777260]

And also these bugs:
- httpd-2.2.x-bnc798733-SNI_ignorecase.diff: ignore case when
  checking against SNI server names. [bnc#798733]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081839" comment="apache2-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081842" comment="apache2-devel-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081843" comment="apache2-doc-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081844" comment="apache2-event-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081846" comment="apache2-example-pages-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081847" comment="apache2-itk-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081849" comment="apache2-prefork-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081851" comment="apache2-utils-2.2.22-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081853" comment="apache2-worker-2.2.22-10.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:34" version="1" class="patch">
	<metadata>
		<title>update for roundcubemail</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Update to version 0.8.6 (bnc#812568)
  * Fix security issue in save-pref command (CVE-2013-1904)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081855" comment="roundcubemail-0.8.6-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:35" version="1" class="patch">
	<metadata>
		<title>Mozilla Firefox and others: Update to Firefox 20.0 release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The Mozilla suite received security and bugfix updates:

Mozilla Firefox was updated to version 20.0.
Mozilla Thunderbird was updated to version 17.0.5.
Mozilla Seamonkey was updated to version 17.0.5.
Mozilla XULRunner was updated to version 17.0.5.
mozilla-nss was updated to version 3.14.3.
mozilla-nspr was updated to version 4.9.6.

mozilla-nspr was updated to version 4.9.6:
* aarch64 support
* added PL_SizeOfArenaPoolExcludingPool function (bmo#807883)
* Auto detect android api version for x86 (bmo#782214)
* Initialize Windows CRITICAL_SECTIONs without debug info and
  with nonzero spin count (bmo#812085)
Previous update to version 4.9.5
* bmo#634793: define NSPR's exact-width integer types PRInt{N} and
  PRUint{N} types to match the &amp;lt;stdint.h&amp;gt; exact-width integer types
  int{N}_t and uint{N}_t.
* bmo#782815: passing 'int *' to parameter of type 'unsigned int *'
  in setsockopt().
* bmo#822932: Port bmo#802527 (NDK r8b support for x86) to NSPR.
* bmo#824742: NSPR shouldn't require librt on Android.
* bmo#831793: data race on lib-&amp;gt;refCount in PR_UnloadLibrary.

mozilla-nss was updated to version 3.14.3:
* disable tests with expired certificates
* add SEC_PKCS7VerifyDetachedSignatureAtTime using patch from
  mozilla tree to fulfill Firefox 21 requirements

* No new major functionality is introduced in this release. This
  release is a patch release to address CVE-2013-1620 (bmo#822365)
* &amp;quot;certutil -a&amp;quot; was not correctly producing ASCII output as
  requested. (bmo#840714)
* NSS 3.14.2 broke compilation with older versions of sqlite that
  lacked the SQLITE_FCNTL_TEMPFILENAME file control. NSS 3.14.3 now
  properly compiles when used with older versions of sqlite
  (bmo#837799) - remove system-sqlite.patch
* add arm aarch64 support

* added system-sqlite.patch (bmo#837799)
  * do not depend on latest sqlite just for a #define
* enable system sqlite usage again

* update to 3.14.2
  * required for Firefox &amp;gt;= 20
  * removed obsolete nssckbi update patch
  * MFSA 2013-40/CVE-2013-0791 (bmo#629816)
    Out-of-bounds array read in CERT_DecodeCertPackage
* disable system sqlite usage since we depend on 3.7.15 which is
  not provided in any openSUSE distribution
  * add nss-sqlitename.patch to avoid any name clash

Changes in MozillaFirefox:
- update to Firefox 20.0 (bnc#813026)
  * requires NSPR 4.9.5 and NSS 3.14.3
  * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789
    Miscellaneous memory safety hazards
  * MFSA 2013-31/CVE-2013-0800 (bmo#825721)
    Out-of-bounds write in Cairo library
  * MFSA 2013-35/CVE-2013-0796 (bmo#827106)
    WebGL crash with Mesa graphics driver on Linux
  * MFSA 2013-36/CVE-2013-0795 (bmo#825697)
    Bypass of SOW protections allows cloning of protected nodes
  * MFSA 2013-37/CVE-2013-0794 (bmo#626775)
    Bypass of tab-modal dialog origin disclosure
  * MFSA 2013-38/CVE-2013-0793 (bmo#803870)
    Cross-site scripting (XSS) using timed history navigations
  * MFSA 2013-39/CVE-2013-0792 (bmo#722831)
    Memory corruption while rendering grayscale PNG images
- use GStreamer 1.0 starting with 12.3 (mozilla-gstreamer-1.patch)
- build fixes for armv7hl:
  * disable debug build as armv7hl does not have enough memory
  * disable webrtc on armv7hl as it is non-compiling

Changes in MozillaThunderbird:
- update to Thunderbird 17.0.5 (bnc#813026)
  * requires NSPR 4.9.5 and NSS 3.14.3
  * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789
    Miscellaneous memory safety hazards
  * MFSA 2013-31/CVE-2013-0800 (bmo#825721)
    Out-of-bounds write in Cairo library
  * MFSA 2013-35/CVE-2013-0796 (bmo#827106)
    WebGL crash with Mesa graphics driver on Linux
  * MFSA 2013-36/CVE-2013-0795 (bmo#825697)
    Bypass of SOW protections allows cloning of protected nodes
  * MFSA 2013-38/CVE-2013-0793 (bmo#803870)
    Cross-site scripting (XSS) using timed history navigations

Changes in seamonkey:
- update to SeaMonkey 2.17 (bnc#813026)
  * requires NSPR 4.9.5 and NSS 3.14.3
  * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789
    Miscellaneous memory safety hazards
  * MFSA 2013-31/CVE-2013-0800 (bmo#825721)
    Out-of-bounds write in Cairo library
  * MFSA 2013-35/CVE-2013-0796 (bmo#827106)
    WebGL crash with Mesa graphics driver on Linux
  * MFSA 2013-36/CVE-2013-0795 (bmo#825697)
    Bypass of SOW protections allows cloning of protected nodes
  * MFSA 2013-37/CVE-2013-0794 (bmo#626775)
    Bypass of tab-modal dialog origin disclosure
  * MFSA 2013-38/CVE-2013-0793 (bmo#803870)
    Cross-site scripting (XSS) using timed history navigations
  * MFSA 2013-39/CVE-2013-0792 (bmo#722831)
    Memory corruption while rendering grayscale PNG images
- use GStreamer 1.0 starting with 12.3 (mozilla-gstreamer-1.patch)

Changes in xulrunner:
- update to 17.0.5esr (bnc#813026)
  * requires NSPR 4.9.5 and NSS 3.14.3
  * MFSA 2013-30/CVE-2013-0788
    Miscellaneous memory safety hazards
  * MFSA 2013-31/CVE-2013-0800 (bmo#825721)
    Out-of-bounds write in Cairo library
  * MFSA 2013-35/CVE-2013-0796 (bmo#827106)
    WebGL crash with Mesa graphics driver on Linux
  * MFSA 2013-36/CVE-2013-0795 (bmo#825697)
    Bypass of SOW protections allows cloning of protected nodes
  * MFSA 2013-37/CVE-2013-0794 (bmo#626775)
    Bypass of tab-modal dialog origin disclosure
  * MFSA 2013-38/CVE-2013-0793 (bmo#803870)
    Cross-site scripting (XSS) using timed history navigations
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081856" comment="MozillaFirefox-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081857" comment="MozillaFirefox-branding-upstream-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081858" comment="MozillaFirefox-buildsymbols-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081861" comment="MozillaFirefox-devel-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081862" comment="MozillaFirefox-translations-common-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081863" comment="MozillaFirefox-translations-other-20.0-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081864" comment="MozillaThunderbird-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081865" comment="MozillaThunderbird-buildsymbols-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081868" comment="MozillaThunderbird-devel-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081870" comment="MozillaThunderbird-translations-common-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081871" comment="MozillaThunderbird-translations-other-17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081872" comment="enigmail-1.5.1+17.0.5-61.9.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081874" comment="mozilla-nspr-32bit-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081875" comment="mozilla-nspr-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081879" comment="mozilla-nspr-devel-4.9.6-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081880" comment="libfreebl3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081881" comment="libfreebl3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081884" comment="libsoftokn3-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081885" comment="libsoftokn3-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081888" comment="mozilla-nss-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081889" comment="mozilla-nss-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081890" comment="mozilla-nss-certs-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081891" comment="mozilla-nss-certs-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081897" comment="mozilla-nss-devel-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081898" comment="mozilla-nss-sysinit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081899" comment="mozilla-nss-sysinit-32bit-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081902" comment="mozilla-nss-tools-3.14.3-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081904" comment="mozilla-js-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081905" comment="mozilla-js-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081908" comment="xulrunner-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081909" comment="xulrunner-32bit-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081910" comment="xulrunner-buildsymbols-17.0.5-1.8.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081914" comment="xulrunner-devel-17.0.5-1.8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:36" version="1" class="patch">
	<metadata>
		<title>update for rubygem-actionpack-3_2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Changes in rubygem-actionpack-3_2:
- add 2 patches to fix security issues:
  - bug-809935_3-2-css_sanitize.patch:
    CVE-2013-1855: rubygem-actionpack*: XSS vulnerability in
    sanitize_css in Action Pack (bnc#809935)
  - bug-809940_3-2-sanitize_protocol.patch:
    CVE-2013-1857: rubygem-actionpack*: XSS Vulnerability in the
    `sanitize` helper of Ruby on Rails (bnc#809940)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081916" comment="rubygem-actionpack-3_2-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081917" comment="rubygem-actionpack-3_2-doc-3.2.12-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:37" version="1" class="patch">
	<metadata>
		<title>update for rubygem-activerecord-3_2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Changes in rubygem-activerecord-3_2:
- add patch to fix security issue:
  - bug-809932_3-2-attribute_symbols.patch:
    fix CVE-2013-1854: rubygem-activerecord*: Symbol DoS vulnerability
    in Active Record (bnc#809932)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081918" comment="rubygem-activerecord-3_2-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081919" comment="rubygem-activerecord-3_2-doc-3.2.12-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:38" version="1" class="patch">
	<metadata>
		<title>postgresql92: Various security fixes. Update to 9.2.4.</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

  postgresql was updated to version 9.2.4 (bnc#812525):
  * CVE-2013-1899: Fix insecure parsing of server command-line
    switches. A connection request containing a database name that
    begins with &amp;quot;-&amp;quot; could be crafted to damage or destroy files
    within the server's data directory, even if the request is
    eventually rejected.
  * CVE-2013-1900: Reset OpenSSL randomness state in each
    postmaster child process. This avoids a scenario wherein
    random numbers generated by &amp;quot;contrib/pgcrypto&amp;quot; functions might
    be relatively easy for another database user to guess. The
    risk is only significant when the postmaster is configured
    with ssl = on but most connections don't use SSL encryption.
  * CVE-2013-1901: Make REPLICATION privilege checks test current
    user not authenticated user.  An unprivileged database user
    could exploit this mistake to call pg_start_backup() or
    pg_stop_backup(), thus possibly interfering with creation of
    routine backups.
  * See the release notes for the rest of the changes:
    http://www.postgresql.org/docs/9.2/static/release-9-2-4.html
    /usr/share/doc/packages/postgresql92/HISTORY
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081920" comment="libecpg6-32bit-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081921" comment="libecpg6-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081924" comment="libpq5-32bit-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081925" comment="libpq5-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081928" comment="postgresql92-devel-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081930" comment="postgresql92-libs-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081932" comment="postgresql92-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081933" comment="postgresql92-contrib-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081937" comment="postgresql92-docs-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081938" comment="postgresql92-plperl-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081940" comment="postgresql92-plpython-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081942" comment="postgresql92-pltcl-9.2.4-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081944" comment="postgresql92-server-9.2.4-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:39" version="1" class="patch">
	<metadata>
		<title>subversion: security and bugfix minor version updates</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Subversion received minor version updates to fix remote triggerable vulnerabilities
in mod_dav_svn which may result in denial of service.

On openSUSE 12.1:  
- update to 1.6.21 [bnc#813913], addressing remotely triggerable 
  + CVE-2013-1845: mod_dav_svn excessive memory usage from property changes
  + CVE-2013-1846: mod_dav_svn crashes on LOCK requests against activity URLs
  + CVE-2013-1847: mod_dav_svn crashes on LOCK requests against non-existant URLs
  + CVE-2013-1849: mod_dav_svn crashes on PROPFIND requests against activity URLs
- further changes:
  + mod_dav_svn will omit some property values for activity urls
  + improve memory usage when committing properties in mod_dav_svn
  + fix mod_dav_svn runs pre-revprop-change twice
  + fixed: post-revprop-change errors cancel commit
  + improved logic in mod_dav_svn's implementation of lock.
  + fix a compatibility issue with g++ 4.7

On openSUSE 12.2 and 12.3:
- update to 1.7.9 [bnc#813913], addressing remotely triggerable 
  vulnerabilities in mod_dav_svn which may result in denial of service:
  + CVE-2013-1845: mod_dav_svn excessive memory usage from property changes
  + CVE-2013-1846: mod_dav_svn crashes on LOCK requests against activity URLs
  + CVE-2013-1847: mod_dav_svn crashes on LOCK requests against non-existant URLs
  + CVE-2013-1849: mod_dav_svn crashes on PROPFIND requests against activity URLs
  + CVE-2013-1884: mod_dav_svn crashes on out of range limit in log REPORT
- further changes:
  + Client-side bugfixes:
    * improved error messages about svn:date and svn:author props.
    * fix local_relpath assertion
    * fix memory leak in `svn log` over svn://
    * fix incorrect authz failure when using neon http library
    * fix segfault when using kwallet
  + Server-side bugfixes:
    * svnserve will log the replayed rev not the low-water rev.
    * mod_dav_svn will omit some property values for activity urls
    * fix an assertion in mod_dav_svn when acting as a proxy on /
    * improve memory usage when committing properties in mod_dav_svn
    * fix svnrdump to load dump files with non-LF line endings
    * fix assertion when rep-cache is inaccessible
    * improved logic in mod_dav_svn's implementation of lock.
    * avoid executing unnecessary code in log with limit
- Developer-visible changes:
  + General:
    * fix an assertion in dav_svn_get_repos_path() on Windows
    * fix get-deps.sh to correctly download zlib
    * doxygen docs will now ignore prefixes when producing the index
    * fix get-deps.sh on freebsd
  + Bindings:
    * javahl status api now respects the ignoreExternals boolean
- refresh subversion-no-build-date.patch for upstream source changes
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081946" comment="libsvn_auth_gnome_keyring-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081948" comment="libsvn_auth_kwallet-1-0-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081950" comment="subversion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081951" comment="subversion-bash-completion-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081954" comment="subversion-devel-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081955" comment="subversion-perl-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081957" comment="subversion-python-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081959" comment="subversion-server-1.7.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081961" comment="subversion-tools-1.7.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:40" version="1" class="patch">
	<metadata>
		<title>seamonkey: 2.17 update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Seamonkey was updated to the 2.17 release, fixing
bugs and security issues:


- update to SeaMonkey 2.17 (bnc#813026)
  * requires NSPR 4.9.5 and NSS 3.14.3
  * mozilla-webrtc-ppc.patch included upstream
  * MFSA 2013-30/CVE-2013-0788/CVE-2013-0789
    Miscellaneous memory safety hazards
  * MFSA 2013-31/CVE-2013-0800 (bmo#825721)
    Out-of-bounds write in Cairo library
  * MFSA 2013-35/CVE-2013-0796 (bmo#827106)
    WebGL crash with Mesa graphics driver on Linux
  * MFSA 2013-36/CVE-2013-0795 (bmo#825697)
    Bypass of SOW protections allows cloning of protected nodes
  * MFSA 2013-37/CVE-2013-0794 (bmo#626775)
    Bypass of tab-modal dialog origin disclosure
  * MFSA 2013-38/CVE-2013-0793 (bmo#803870)
    Cross-site scripting (XSS) using timed history navigations
  * MFSA 2013-39/CVE-2013-0792 (bmo#722831)
    Memory corruption while rendering grayscale PNG images
- use GStreamer 1.0 starting with 12.3 (mozilla-gstreamer-1.patch)
- revert to use GStreamer 0.10 on 12.3 (bnc#814101)
  (remove mozilla-gstreamer-1.patch)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081963" comment="seamonkey-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081966" comment="seamonkey-dom-inspector-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081967" comment="seamonkey-irc-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081968" comment="seamonkey-translations-common-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081969" comment="seamonkey-translations-other-2.17-1.8.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081970" comment="seamonkey-venkman-2.17-1.8.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:41" version="1" class="patch">
	<metadata>
		<title>curl: fixed cookie tail matching problem</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

libcurl was updated to fix a cookie tail matching
flaw which could lead to attackers gaining cookie access
depending on domain names. (CVE-2013-1944,bnc#814655)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081971" comment="curl-7.28.1-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081974" comment="libcurl-devel-7.28.1-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081975" comment="libcurl4-32bit-7.28.1-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081976" comment="libcurl4-7.28.1-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:42" version="1" class="patch">
	<metadata>
		<title>Mesa: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This Mesa update fixes the following security bug:
CVE-2013-1993: Integer overflows in XF86DRIOpenConnection and XF86DRIGetClientDriverName were fixed
that could lead to client crashes when using a malicious X server.

This update fixes the following issue for Mesa on openSUSE 12.3:
- bnc#814947, fdo#62141: Make sure we do render between two hiz flushes

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009081979" comment="Mesa-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081980" comment="Mesa-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081984" comment="Mesa-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081985" comment="Mesa-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081986" comment="Mesa-libEGL-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081987" comment="Mesa-libEGL-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081988" comment="Mesa-libEGL1-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081989" comment="Mesa-libEGL1-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081992" comment="Mesa-libGL-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081993" comment="Mesa-libGL-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081994" comment="Mesa-libGL1-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081995" comment="Mesa-libGL1-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081998" comment="Mesa-libGLESv1_CM-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009081999" comment="Mesa-libGLESv1_CM-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082000" comment="Mesa-libGLESv1_CM1-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082001" comment="Mesa-libGLESv1_CM1-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082004" comment="Mesa-libGLESv2-2-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082005" comment="Mesa-libGLESv2-2-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082008" comment="Mesa-libGLESv2-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082009" comment="Mesa-libGLESv2-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082010" comment="Mesa-libIndirectGL-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082011" comment="Mesa-libIndirectGL-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082012" comment="Mesa-libIndirectGL1-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082013" comment="Mesa-libIndirectGL1-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082016" comment="Mesa-libglapi-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082017" comment="Mesa-libglapi-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082018" comment="Mesa-libglapi0-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082019" comment="Mesa-libglapi0-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082022" comment="libOSMesa-devel-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082023" comment="libOSMesa-devel-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082024" comment="libOSMesa9-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082025" comment="libOSMesa9-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082028" comment="libXvMC_nouveau-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082029" comment="libXvMC_nouveau-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082032" comment="libXvMC_r300-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082033" comment="libXvMC_r300-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082036" comment="libXvMC_r600-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082037" comment="libXvMC_r600-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082040" comment="libXvMC_softpipe-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082041" comment="libXvMC_softpipe-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082044" comment="libgbm-devel-0.0.0-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082045" comment="libgbm-devel-32bit-0.0.0-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082046" comment="libgbm1-0.0.0-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082047" comment="libgbm1-32bit-0.0.0-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082050" comment="libvdpau_nouveau-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082051" comment="libvdpau_nouveau-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082054" comment="libvdpau_r300-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082055" comment="libvdpau_r300-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082058" comment="libvdpau_r600-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082059" comment="libvdpau_r600-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082062" comment="libvdpau_softpipe-32bit-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082063" comment="libvdpau_softpipe-9.0.2-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082066" comment="libxatracker-devel-1.0.0-34.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082067" comment="libxatracker1-1.0.0-34.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:43" version="1" class="patch">
	<metadata>
		<title>update for icedtea-web</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- update to 1.3.2 (bnc#815596) 
- Security Updates
  * CVE-2013-1927, RH884705: fixed gifar vulnerability
  * CVE-2013-1926, RH916774: Class-loader incorrectly shared for applets with same relative-path.
- Common
  * Added new option in itw-settings which allows users to set JVM arguments
    when plugin is initialized.
- NetX
  * PR580: http://www.horaoficial.cl/ loads improperly
- Plugin
  * PR1260: IcedTea-Web should not rely on GTK
   obsoletes icedtea-web-remove-gtk-dep.patch
  * PR1157: Applets can hang browser after fatal exception
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082069" comment="icedtea-web-1.3.2-4.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082072" comment="icedtea-web-javadoc-1.3.2-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:44" version="1" class="patch">
	<metadata>
		<title>kernel: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The openSUSE 12.3 kernel was updated to fix various security issues and bugs:

- config.conf: Disable armv7hl/u8500 until it builds again

- patches.fixes/ocfs2-Fix-oops-in-ocfs2_fast_symlink_readpage: ocfs2: Fix oops in ocfs2_fast_symlink_readpage() code path

- drm/nouveau: Fix typo in init_idx_addr_latched() (bnc#800686).

- rtl28xxu: Add USB ID for MaxMedia HU394-T (bnc#812113).
- rtl28xxu: Add USB IDs for Compro VideoMate U620F (bnc#812113).
- Support Digivox Mini HD (rtl2832) (bnc#812113).
- rtl28xxu: correct some device names (bnc#812113).
- rtl28xxu: add Gigabyte U7300 DVB-T Dongle (bnc#812113).
- rtl28xxu: [1b80:d3a8] ASUS My Cinema-U3100Mini Plus V2
  (bnc#812113).
- rtl28xxu: add NOXON DAB/DAB+ USB dongle rev 2 (bnc#812113).

- drm: correctly restore mappings if drm_open fails (bnc#807850).

- Drivers: hv: vmbus: Fix a bug in hv_need_to_signal()
  (bnc#811417).

- svcrpc: fix rpc server shutdown races (bnc#802812).

- Update patches to what was accepted upstream.
- Refresh
  patches.arch/kvm-convert-msr_kvm_system_time-to-use-gfn_to_hva_cache_init.patch.
- Refresh
  patches.arch/kvm-fix-for-buffer-overflow-in-handling-of-msr_kvm_system_time.patch.

- KVM: Convert MSR_KVM_SYSTEM_TIME to use gfn_to_hva_cache_init
  (bnc#806980 CVE-2013-1797).
- KVM: Fix bounds checking in ioapic indirect register read
  (bnc#806980 CVE-2013-1798).
- KVM: Fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME
  (bnc#806980 CVE-2013-1796).
- kabi/severities: Allow kvm abi changes - kvm modules are self consistent

- loopdev: fix a deadlock (bnc#809748).
- block: use i_size_write() in bd_set_size() (bnc#809748).

- drm/i915: bounds check execbuffer relocation count
  (bnc#808829,CVE-2013-0913).

- TTY: do not reset master's packet mode (bnc#809330).

- Update patches.fixes/ext3-Fix-format-string-issues.patch
  (bnc#809155 CVE-2013-1848).

- ext3: Fix format string issues (bnc#809155).

- Drivers: hv: balloon: Do not request completion notification
  (fate#314663).

- e1000e: fix runtime power management transitions (bnc#806966).
- e1000e: fix pci-device enable-counter balance (bnc#806966).
- e1000e: fix accessing to suspended device (bnc#806966).

- gpio-ich: Fix ichx_gpio_check_available() return what callers expect.

- gpio/ich: Add missing spinlock init.

- Refresh patches.suse/SUSE-bootsplash-mgadrmfb-workaround.
  Add the same w/a for ast and cirrus KMS, too (bnc#806990).

- Fix broken VT1 output with mgadrmfb (bnc#806990).

- PCI/PM: Clear state_saved during suspend (bnc#806966).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082073" comment="kernel-debug-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082074" comment="kernel-debug-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082078" comment="kernel-debug-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082080" comment="kernel-default-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082081" comment="kernel-default-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082085" comment="kernel-default-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082087" comment="kernel-desktop-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082088" comment="kernel-desktop-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082092" comment="kernel-desktop-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082094" comment="kernel-docs-3.7.10-1.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082095" comment="kernel-ec2-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082096" comment="kernel-ec2-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082100" comment="kernel-ec2-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082102" comment="kernel-pae-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082103" comment="kernel-pae-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082107" comment="kernel-pae-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082109" comment="kernel-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082110" comment="kernel-source-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082111" comment="kernel-source-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082112" comment="kernel-syms-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082113" comment="kernel-trace-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082114" comment="kernel-trace-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082118" comment="kernel-trace-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082120" comment="kernel-vanilla-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082123" comment="kernel-vanilla-devel-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082125" comment="kernel-xen-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082126" comment="kernel-xen-base-3.7.10-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082130" comment="kernel-xen-devel-3.7.10-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:45" version="1" class="patch">
	<metadata>
		<title>libxml2 security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- fix for CVE-2013-1969 (bnc#815665)
  * libxml2-CVE-2013-1969.patch

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082132" comment="libxml2-2-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082133" comment="libxml2-2-32bit-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082136" comment="libxml2-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082138" comment="libxml2-devel-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082139" comment="libxml2-devel-32bit-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082140" comment="libxml2-doc-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082141" comment="libxml2-tools-2.9.0-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082143" comment="python-libxml2-2.9.0-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:46" version="1" class="patch">
	<metadata>
		<title>krb5 security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- fix prep_reprocess_req NULL pointer deref
  CVE-2013-1416 (bnc#816413)
  bug-816413-CVE-2013-1416-prep_reprocess_req-NULL-ptr-deref.dif
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082146" comment="krb5-doc-1.10.2-10.13.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082147" comment="krb5-mini-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082150" comment="krb5-mini-devel-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082151" comment="krb5-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082152" comment="krb5-32bit-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082153" comment="krb5-client-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082158" comment="krb5-devel-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082159" comment="krb5-devel-32bit-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082160" comment="krb5-plugin-kdb-ldap-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082162" comment="krb5-plugin-preauth-pkinit-1.10.2-10.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082164" comment="krb5-server-1.10.2-10.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:47" version="1" class="patch">
	<metadata>
		<title>update for java-1_7_0-openjdk</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- update to icedtea-2.3.9 (bnc#816720) 
* Security fixes
  - S6657673, CVE-2013-1518: Issues with JAXP
  - S7200507: Refactor Introspector internals
  - S8000724, CVE-2013-2417: Improve networking serialization
  - S8001031, CVE-2013-2419: Better font processing
  - S8001040, CVE-2013-1537: Rework RMI model
  - S8001322: Refactor deserialization
  - S8001329, CVE-2013-1557: Augment RMI logging
  - S8003335: Better handling of Finalizer thread
  - S8003445: Adjust JAX-WS to focus on API
  - S8003543, CVE-2013-2415: Improve processing of MTOM attachments
  - S8004261: Improve input validation
  - S8004336, CVE-2013-2431: Better handling of method handle intrinsic frames
  - S8004986, CVE-2013-2383: Better handling of glyph table
  - S8004987, CVE-2013-2384: Improve font layout
  - S8004994, CVE-2013-1569: Improve checking of glyph table
  - S8005432: Update access to JAX-WS
  - S8005943: (process) Improved Runtime.exec
  - S8006309: More reliable control panel operation
  - S8006435, CVE-2013-2424: Improvements in JMX
  - S8006790: Improve checking for windows
  - S8006795: Improve font warning messages
  - S8007406: Improve accessibility of AccessBridge
  - S8007617, CVE-2013-2420: Better validation of images
  - S8007667, CVE-2013-2430: Better image reading
  - S8007918, CVE-2013-2429: Better image writing
  - S8008140: Better method handle resolution
  - S8009049, CVE-2013-2436: Better method handle binding
  - S8009063, CVE-2013-2426: Improve reliability of ConcurrentHashMap
  - S8009305, CVE-2013-0401: Improve AWT data transfer
  - S8009677, CVE-2013-2423: Better setting of setters
  - S8009699, CVE-2013-2421: Methodhandle lookup
  - S8009814, CVE-2013-1488: Better driver management
  - S8009857, CVE-2013-2422: Problem with plugin
* Backports
  - S7130662, RH928500: GTK file dialog crashes with a NPE
* Bug fixes
  - PR1363: Fedora 19 / rawhide FTBFS SIGILL
  - PR1401: Fix Zero build on 2.3.8
  - Fix offset problem in ICU LETableReference.
  - Change -Werror fix to preserve OpenJDK default.
  - PR1303: Correct #ifdef to #if
  - PR1404: Failure to bootstrap with ecj 4.2

- Added url as source.
  Please see http://en.opensuse.org/SourceUrls

- icedtea-2.3.8-zero-patches.patch: remove patch not applicable to zero
  compatible hotspot
- java-1.7.0-openjdk-fork.patch: Add support for architectures without
  fork syscall
- java-1.7.0-openjdk-aarch64.patch: Add support for aarch64

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082166" comment="java-1_7_0-openjdk-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082169" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082171" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082173" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.14.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082174" comment="java-1_7_0-openjdk-src-1.7.0.6-8.14.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:48" version="1" class="patch">
	<metadata>
		<title>update for xorg-x11-server</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- U_xf86-fix-flush-input-to-work-with-Linux-evdev-device.patch
  * So when we VT switch back and attempt to flush the input
    devices, we don't succeed because evdev won't return part
    of an event, since we were only asking for 4 bytes, we'd
    only get -EINVAL back. This could later cause events to be
    flushed that we shouldn't have gotten.
    This is a fix for CVE-2013-1940. (bnc#814653)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082175" comment="xorg-x11-server-7.6_1.13.2-1.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082178" comment="xorg-x11-server-extra-7.6_1.13.2-1.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082180" comment="xorg-x11-server-sdk-7.6_1.13.2-1.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:49" version="1" class="patch">
	<metadata>
		<title>update for strongswan</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Applied upstream patch for security vulnerability discovered by
  Kevin Wojtysiak in ECDSA signature verification of the strongswan
  openssl plugin (bnc#815236, CVE-2013-2944)
  [0003-Check-return-value-of-ECDSA_Verify-correctly.patch]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082181" comment="strongswan-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082183" comment="strongswan-doc-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082184" comment="strongswan-ipsec-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082186" comment="strongswan-libs0-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082188" comment="strongswan-mysql-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082190" comment="strongswan-nm-5.0.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082192" comment="strongswan-sqlite-5.0.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:50" version="1" class="patch">
	<metadata>
		<title>update for python-httplib2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of python-httplib2 fixed broken SSL certification verification.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082194" comment="python-httplib2-0.7.6-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:51" version="1" class="patch">
	<metadata>
		<title>update for telepathy-idle</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Changes in telepathy-idle:
- Add telepathy-idle-require-tls-validation.patch (bnc#817120,
  CVE-2007-6746). This fixes flaws in the SSL certificate
  validation.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082195" comment="telepathy-idle-0.1.14-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:52" version="1" class="patch">
	<metadata>
		<title>update for openconnect</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This version update fixes several bugs:
- Frequent connection drops fixed (bnc#817152).
- Update to version 4.09
  * Fix overflow on HTTP request buffers (CVE-2012-6128)(bnc#803347)
  * Fix connection to servers with round-robin DNS with two-stage 
    auth/connect.
  * Impose minimum MTU of 1280 bytes.
  * Fix some harmless issues reported by Coverity.
  * Improve &amp;quot;Attempting to connect...&amp;quot; message to be explicit 
    when it's connecting to a proxy.
- Update to version 4.07
  * Fix segmentation fault when invoked with -p argument.
  * Fix handling of write stalls on CSTP (TCP) socket.
- Update to version 4.06
  *  Fix default CA location for non-Fedora systems with old GnuTLS.
  *  Improve error handing when vpnc-script exits with error.
  *  Handle PKCS#11 tokens which won't list keys without login.
- Update to version 4.05
  * Use correct CSD script for Mac OS X.
  * Fix endless loop in PIN cache handling with multiple PKCS#11 
    tokens.
  * Fix PKCS#11 URI handling to preserve all attributes.
  * Don't forget key password on GUI reconnect.
  * Fix GnuTLS v3 build on OpenBSD.
- Update to version 4.04
  * Fix GnuTLS password handling for PKCS#8 files.
- Update to version 4.03
  *  Fix --no-proxy option.
  * Fix handling of requested vs. received MTU settings.
  * Fix DTLS MTU for GnuTLS 3.0.21 and newer.
  * Support more ciphers for OpenSSL encrypted PEM keys, with 
    GnuTLS.
  * Fix GnuTLS compatibilty issue with servers that insist on 
    TLSv1.0 or non-AES ciphers (RH#836558).
- Update to version 4.02
  * Fix build failure due to unconditional inclusion of 
    &amp;lt;gnutls/dtls.h&amp;gt;.
- Update to version 4.01
  * Add support for OpenSSL's odd encrypted PKCS#1 files, for 
    GnuTLS.
  * Fix repeated passphrase retry for OpenSSL.
  * Add keystore support for Android.
  * Support TPM, and also additional checks on PKCS#11 certs, 
    even with GnuTLS 2.12.
  * Fix library references to OpenSSL's ERR_print_errors_cb() when built against GnuTLS v2.12.
- Update to version 4.00
  * Add support for OpenSSL's odd encrypted PKCS#1 files, for GnuTLS.
  * Fix repeated passphrase retry for OpenSSL.
  * Add keystore support for Android.
  * Support TPM, and also additional checks on PKCS#11 certs, even with GnuTLS 2.12.
  * Fix library references to OpenSSL's ERR_print_errors_cb() when built against GnuTLS v2.12.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082198" comment="openconnect-4.08-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082201" comment="openconnect-devel-4.08-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082202" comment="openconnect-doc-4.08-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082203" comment="openconnect-lang-4.08-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:53" version="1" class="patch">
	<metadata>
		<title>Package icedtea-web was updated to version 1.4.</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Changes in icedtea-web with update to 1.4 (bnc#818768):
* Added cs, de, pl localization
* Splash screen for javaws and plugin
* Better error reporting for plugin via Error-splash-screen
* All IcedTea-Web dialogues are centered to middle of active screen
* Download indicator made compact for more then one jar
* User can select its own JVM via itw-settings and deploy.properties.
* Added extended applets security settings and dialogue
* Security updates
  - CVE-2013-1926, RH916774: Class-loader incorrectly shared for applets with same relative-path.
  - CVE-2013-1927, RH884705: fixed gifar vulnerabilit
  - CVE-2012-3422, RH840592: Potential read from an uninitialized memory location
  - CVE-2012-3423, RH841345: Incorrect handling of not 0-terminated strings
* NetX
  - PR1027: DownloadService is not supported by IcedTea-Web
  - PR725: JNLP applications will prompt for creating desktop shortcuts every time they are run
  - PR1292: Javaws does not resolve versioned jar names with periods correctly
* Plugin
  - PR1106: Buffer overflow in plugin table-
  - PR1166: Embedded JNLP File is not supported in applet tag
  - PR1217: Add command line arguments for plugins
  - PR1189: Icedtea-plugin requires code attribute when using jnlp_href
  - PR1198: JSObject is not passed to javascript correctly
  - PR1260: IcedTea-Web should not rely on GTK
  - PR1157: Applets can hang browser after fatal exception
  - PR580: http://www.horaoficial.cl/ loads improperly
* Common
  - PR1049: Extension jnlp's signed jar with the content of only META-INF/* is considered
  - PR955: regression: SweetHome3D fails to run
  - PR1145: IcedTea-Web can cause ClassCircularityError
  - PR1161: X509VariableTrustManager does not work correctly with OpenJDK7
  - PR822: Applets fail to load if jars have different signers
  - PR1186: System.getProperty(&amp;quot;deployment.user.security.trusted.cacerts&amp;quot;) is null
  - PR909: The Java applet at http://de.gosupermodel.com/games/wardrobegame.jsp fails
  - PR1299: WebStart doesn't read socket proxy settings from firefox correctly
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082204" comment="icedtea-web-1.4-4.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082207" comment="icedtea-web-javadoc-1.4-4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:54" version="1" class="patch">
	<metadata>
		<title>Update for clamav to version 0.97.8.</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
New clamav version 0.97.8 (bnc#816865):
  * CVE-2013-2020: Fix heap corruption
  * CVE-2013-2021: Fix overflow due to PDF key length computation.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082208" comment="clamav-0.97.8-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:55" version="1" class="patch">
	<metadata>
		<title>tiff: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
libtiff security update:
  * CVE-2013-1961.patch [bnc#818117]
  * CVE-2013-1960.patch [bnc#817573]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082211" comment="libtiff-devel-32bit-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082212" comment="libtiff-devel-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082213" comment="libtiff5-32bit-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082214" comment="libtiff5-4.0.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082217" comment="tiff-4.0.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:56" version="1" class="patch">
	<metadata>
		<title>openstack-keystone: was updated to fix token invalidation</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

OpenStack Keystone was updated to fix (bnc#818596, CVE-2013-2059):
Keystone tokens not immediately invalidated when user is deleted.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082220" comment="openstack-keystone-doc-2012.2.4+git.1363796849.255b1d4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082221" comment="openstack-keystone-2012.2.4+git.1363796849.255b1d4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082222" comment="openstack-keystone-test-2012.2.4+git.1363796849.255b1d4-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082223" comment="python-keystone-2012.2.4+git.1363796849.255b1d4-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:57" version="1" class="patch">
	<metadata>
		<title>This submission supersedes the Samba packages currently available from</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This submission supersedes the Samba packages currently available from
http://download.openSUSE.org/pub/opensuse/update/12.*-test/

- Add support for PFC_FLAG_OBJECT_UUID when parsing packets; (bso#9382).
- Fix &amp;quot;guest ok&amp;quot;, &amp;quot;force user&amp;quot; and &amp;quot;force group&amp;quot; for guest users; (bso#9746).
- Fix 'map untrusted to domain' with NTLMv2; (bso#9817).
- Fix crash bug in Winbind; (bso#9854).

- Fix panic in nt_printer_publish_ads; (bso#9830).		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082224" comment="samba-doc-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082225" comment="ldapsmb-1.34b-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082226" comment="libnetapi-devel-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082227" comment="libnetapi0-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082229" comment="libsmbclient-devel-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082230" comment="libsmbclient0-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082231" comment="libsmbclient0-32bit-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082234" comment="libsmbsharemodes-devel-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082235" comment="libsmbsharemodes0-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082237" comment="libwbclient-devel-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082238" comment="libwbclient0-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082239" comment="libwbclient0-32bit-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082242" comment="samba-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082243" comment="samba-32bit-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082244" comment="samba-client-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082245" comment="samba-client-32bit-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082251" comment="samba-devel-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082252" comment="samba-krb-printing-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082254" comment="samba-winbind-3.6.12-59.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082255" comment="samba-winbind-32bit-3.6.12-59.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:58" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox: update to security update version 21.0</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

MozillaFirefox was updated to Firefox 21.0 (bnc#819204)
* MFSA 2013-41/CVE-2013-0801/CVE-2013-1669
  Miscellaneous memory safety hazards
* MFSA 2013-42/CVE-2013-1670 (bmo#853709)
  Privileged access for content level constructor
* MFSA 2013-43/CVE-2013-1671 (bmo#842255)
  File input control has access to full path
* MFSA 2013-46/CVE-2013-1674 (bmo#860971)
  Use-after-free with video and onresize event
* MFSA 2013-47/CVE-2013-1675 (bmo#866825)
  Uninitialized functions in DOMSVGZoomEvent
* MFSA 2013-48/CVE-2013-1676/CVE-2013-1677/CVE-2013-1678/
  CVE-2013-1679/CVE-2013-1680/CVE-2013-1681
  Memory corruption found using Address Sanitizer

Changes in MozillaFirefox-branding-openSUSE:
- modified file locations for Firefox 21 and above
- added DuckDuckGo as search option (bnc#801121)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082258" comment="MozillaFirefox-branding-openSUSE-21-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082259" comment="MozillaFirefox-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082260" comment="MozillaFirefox-branding-upstream-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082261" comment="MozillaFirefox-buildsymbols-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082264" comment="MozillaFirefox-devel-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082265" comment="MozillaFirefox-translations-common-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082266" comment="MozillaFirefox-translations-other-21.0-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082267" comment="mozilla-nspr-32bit-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082268" comment="mozilla-nspr-4.9.6-1.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082272" comment="mozilla-nspr-devel-4.9.6-1.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:59" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird: update to 17.0.6</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
MozillaThunderbird was updated to security update Thunderbird 17.0.6 (bnc#819204):
* MFSA 2013-41/CVE-2013-0801/CVE-2013-1669
  Miscellaneous memory safety hazards
* MFSA 2013-42/CVE-2013-1670 (bmo#853709)
  Privileged access for content level constructor
* MFSA 2013-46/CVE-2013-1674 (bmo#860971)
  Use-after-free with video and onresize event
* MFSA 2013-47/CVE-2013-1675 (bmo#866825)
  Uninitialized functions in DOMSVGZoomEvent
* MFSA 2013-48/CVE-2013-1676/CVE-2013-1677/CVE-2013-1678/
  CVE-2013-1679/CVE-2013-1680/CVE-2013-1681
  Memory corruption found using Address Sanitizer
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082273" comment="MozillaThunderbird-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082274" comment="MozillaThunderbird-buildsymbols-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082277" comment="MozillaThunderbird-devel-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082279" comment="MozillaThunderbird-translations-common-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082280" comment="MozillaThunderbird-translations-other-17.0.6-61.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082281" comment="enigmail-1.5.1+17.0.6-61.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:60" version="1" class="patch">
	<metadata>
		<title>xulrunner: security update to 17.0.6esr</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Mozilla xulrunner was updated to 17.0.6esr (bnc#819204)
  * MFSA 2013-41/CVE-2013-0801/CVE-2013-1669
    Miscellaneous memory safety hazards
  * MFSA 2013-42/CVE-2013-1670 (bmo#853709)
    Privileged access for content level constructor
  * MFSA 2013-46/CVE-2013-1674 (bmo#860971)
    Use-after-free with video and onresize event
  * MFSA 2013-47/CVE-2013-1675 (bmo#866825)
    Uninitialized functions in DOMSVGZoomEvent
  * MFSA 2013-48/CVE-2013-1676/CVE-2013-1677/CVE-2013-1678/
    CVE-2013-1679/CVE-2013-1680/CVE-2013-1681
    Memory corruption found using Address Sanitizer
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082283" comment="mozilla-js-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082284" comment="mozilla-js-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082287" comment="xulrunner-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082288" comment="xulrunner-32bit-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082289" comment="xulrunner-buildsymbols-17.0.6-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082293" comment="xulrunner-devel-17.0.6-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:61" version="1" class="patch">
	<metadata>
		<title>kernel: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The openSUSE 12.3 kernel was updated to fix a critical security issue,
other security issues and several bugs.

Security issues fixed:
CVE-2013-2094: The perf_swevent_init function in kernel/events/core.c
in the Linux kernel used an incorrect integer data type, which allowed
local users to gain privileges via a crafted perf_event_open system call.

CVE-2013-0290: The __skb_recv_datagram function in net/core/datagram.c
in the Linux kernel did not properly handle the MSG_PEEK flag with
zero-length data, which allowed local users to cause a denial of service
(infinite loop and system hang) via a crafted application.

Bugs fixed:
- qlge: fix dma map leak when the last chunk is not allocated
  (bnc#819519).

- ACPI / thermal: do not always return THERMAL_TREND_RAISING
  for active trip points (bnc#820048).

- perf: Treat attr.config as u64 in perf_swevent_init()
  (bnc#819789, CVE-2013-2094).

- cxgb4: fix error recovery when t4_fw_hello returns a positive
  value (bnc#818497).

- kabi/severities: Ignore drivers/mfd/ucb1400_core
  It provides internal exports to UCB1400 drivers, that we have just
  disabled.

- Fix -devel package for armv7hl
  armv7hl kernel flavors in the non-multiplatform configuration
  (which is the default for our openSUSE 12.3 release), needs
  more header files from the machine specific directories to
  be included in kernel-devel.

- Update config files: disable UCB1400 on all but ARM
  Currently UCB1400 is only used on ARM OMAP systems, and part of the
  code is dead code that can't even be modularized.
   - CONFIG_UCB1400_CORE=n
   - CONFIG_TOUCHSCREEN_UCB1400=n
   - CONFIG_GPIO_UCB1400=n

- rpm/config.sh: Drop the ARM repository, the KOTD will build
  against the &amp;quot;ports&amp;quot; repository of openSUSE:12.3

- mm/mmap: check for RLIMIT_AS before unmapping (bnc#818327).

- rpm/kernel-spec-macros: Properly handle KOTD release numbers with
  .g&amp;lt;commit&amp;gt; suffix

- rpm/kernel-spec-macros: Drop the %release_num macro
  We no longer put the -rcX tag into the release string.

- xen-pciback: notify hypervisor about devices intended to be
  assigned to guests.

- unix/stream: fix peeking with an offset larger than data in
  queue (bnc#803931 CVE-2013-0290).
- unix/dgram: fix peeking with an offset larger than data in queue
  (bnc#803931 CVE-2013-0290).
- unix/dgram: peek beyond 0-sized skbs (bnc#803931 CVE-2013-0290).
- net: fix infinite loop in __skb_recv_datagram() (bnc#803931
  CVE-2013-0290).

- TTY: fix atime/mtime regression (bnc#815745).

- md/raid1,raid10: fix deadlock with freeze_array() (813889).
- md: raid1,10: Handle REQ_WRITE_SAME flag in write bios
  (bnc#813889).

- KMS: fix EDID detailed timing vsync parsing.
- KMS: fix EDID detailed timing frame rate.

- Add Netfilter/ebtables support
  Those modues are needed for proper OpenStack support
  on ARM, and are also enabled on x86(_64)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082295" comment="kernel-debug-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082296" comment="kernel-debug-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082300" comment="kernel-debug-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082302" comment="kernel-default-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082303" comment="kernel-default-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082307" comment="kernel-default-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082309" comment="kernel-desktop-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082310" comment="kernel-desktop-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082314" comment="kernel-desktop-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082316" comment="kernel-docs-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082317" comment="kernel-ec2-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082318" comment="kernel-ec2-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082322" comment="kernel-ec2-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082324" comment="kernel-pae-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082325" comment="kernel-pae-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082329" comment="kernel-pae-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082331" comment="kernel-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082332" comment="kernel-source-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082333" comment="kernel-source-vanilla-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082334" comment="kernel-syms-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082335" comment="kernel-trace-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082336" comment="kernel-trace-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082340" comment="kernel-trace-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082342" comment="kernel-vanilla-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082345" comment="kernel-vanilla-devel-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082347" comment="kernel-xen-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082348" comment="kernel-xen-base-3.7.10-1.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082352" comment="kernel-xen-devel-3.7.10-1.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:62" version="1" class="patch">
	<metadata>
		<title>update for gpg2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of gpg2 fixes two security issues:
  * fix for CVE-2012-6085 (bnc#798465)
    added gpg2-CVE-2012-6085.patch
  * fix for bnc#780943
    added gpg2-set_umask_before_open_outfile.patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082354" comment="gpg2-2.0.19-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082357" comment="gpg2-lang-2.0.19-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:63" version="1" class="patch">
	<metadata>
		<title>update for libvirt</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libvirt fixes two problems:

- fix leak after listing all volumes - CVE-2013-1962
  ca697e90-CVE-2013-1962.patch bnc#820397

- Fix parsing of bond interface XML
  5ba077dc-iface-bond.patch bnc#810893
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082358" comment="libvirt-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082359" comment="libvirt-client-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082360" comment="libvirt-client-32bit-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082365" comment="libvirt-devel-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082366" comment="libvirt-devel-32bit-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082367" comment="libvirt-doc-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082368" comment="libvirt-lock-sanlock-1.0.2-1.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082370" comment="libvirt-python-1.0.2-1.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:64" version="1" class="patch">
	<metadata>
		<title>update for wireshark</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of wireshark includes several security and bug fixes. [bnc#820566]
  + vulnerabilities fixed:
    * The RELOAD dissector could go into an infinite loop.
      wnpa-sec-2013-23 CVE-2013-2486 CVE-2013-2487
    * The GTPv2 dissector could crash.
      wnpa-sec-2013-24
    * The ASN.1 BER dissector could crash.
      wnpa-sec-2013-25
    * The PPP CCP dissector could crash.
      wnpa-sec-2013-26
    * The DCP ETSI dissector could crash.
      wnpa-sec-2013-27
    * The MPEG DSM-CC dissector could crash.
      wnpa-sec-2013-28
    * The Websocket dissector could crash.
      wnpa-sec-2013-29
    * The MySQL dissector could go into an infinite loop.
      wnpa-sec-2013-30
    * The ETCH dissector could go into a large loop.
      wnpa-sec-2013-31
  + Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.8.7.html
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082372" comment="wireshark-1.8.7-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082375" comment="wireshark-devel-1.8.7-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:65" version="1" class="patch">
	<metadata>
		<title>version update for nginx</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This version update for nginx to 1.2.9 includes a security fix and several
bugfixes and feature enhancements. (bnc#821184)
  *) Security: contents of worker process memory might be sent to a client
     if HTTP backend returned specially crafted response (CVE-2013-2070);
     the bug had appeared in 1.1.4.
  - changes with 1.2.8:
  *) Bugfix: new sessions were not always stored if the &amp;quot;ssl_session_cache
     shared&amp;quot; directive was used and there was no free space in shared
     memory.
  *) Bugfix: responses might hang if subrequests were used and a DNS error
     happened during subrequest processing.
  *) Bugfix: in the ngx_http_mp4_module.
  *) Bugfix: in backend usage accounting.
  - changes with nginx 1.2.7
  *) Change: now if the &amp;quot;include&amp;quot; directive with mask is used on Unix
     systems, included files are sorted in alphabetical order.
  *) Change: the &amp;quot;add_header&amp;quot; directive adds headers to 201 responses.
  *) Feature: the &amp;quot;geo&amp;quot; directive now supports IPv6 addresses in CIDR
     notation.
  *) Feature: the &amp;quot;flush&amp;quot; and &amp;quot;gzip&amp;quot; parameters of the &amp;quot;access_log&amp;quot;
     directive.
  *) Feature: variables support in the &amp;quot;auth_basic&amp;quot; directive.
  *) Feature: the $pipe, $request_length, $time_iso8601, and $time_local
     variables can now be used not only in the &amp;quot;log_format&amp;quot; directive.
  *) Feature: IPv6 support in the ngx_http_geoip_module.
  *) Bugfix: nginx could not be built with the ngx_http_perl_module in
     some cases.
  *) Bugfix: a segmentation fault might occur in a worker process if the
     ngx_http_xslt_module was used.
  *) Bugfix: nginx could not be built on MacOSX in some cases.
  *) Bugfix: the &amp;quot;limit_rate&amp;quot; directive with high rates might result in
     truncated responses on 32-bit platforms.
  *) Bugfix: a segmentation fault might occur in a worker process if the
     &amp;quot;if&amp;quot; directive was used.
  *) Bugfix: a &amp;quot;100 Continue&amp;quot; response was issued with &amp;quot;413 Request Entity
     Too Large&amp;quot; responses.
  *) Bugfix: the &amp;quot;image_filter&amp;quot;, &amp;quot;image_filter_jpeg_quality&amp;quot; and
     &amp;quot;image_filter_sharpen&amp;quot; directives might be inherited incorrectly.
  *) Bugfix: &amp;quot;crypt_r() failed&amp;quot; errors might appear if the &amp;quot;auth_basic&amp;quot;
     directive was used on Linux.
  *) Bugfix: in backup servers handling.
  *) Bugfix: proxied HEAD requests might return incorrect response if the
     &amp;quot;gzip&amp;quot; directive was used.
  *) Bugfix: a segmentation fault occurred on start or during
     reconfiguration if the &amp;quot;keepalive&amp;quot; directive was specified more than
     once in a single upstream block.
  *) Bugfix: in the &amp;quot;proxy_method&amp;quot; directive.
  *) Bugfix: a segmentation fault might occur in a worker process if
     resolver was used with the poll method.
  *) Bugfix: nginx might hog CPU during SSL handshake with a backend if
     the select, poll, or /dev/poll methods were used.
  *) Bugfix: the &amp;quot;[crit] SSL_write() failed (SSL:)&amp;quot; error.
  *) Bugfix: in the &amp;quot;fastcgi_keep_conn&amp;quot; directive.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082376" comment="nginx-1.2.9-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:66" version="1" class="patch">
	<metadata>
		<title>update for libxcb</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libxcb fixes a integer overflow issue:
- U_0001-integer-overflow-in-read_packet-CVE-2013-2064.patch 
  * fixes integer overflow in read_packet() [CVE-2013-2064]
    (bnc#821584, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082379" comment="libxcb-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082380" comment="libxcb-composite0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082381" comment="libxcb-composite0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082384" comment="libxcb-damage0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082385" comment="libxcb-damage0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082389" comment="libxcb-devel-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082390" comment="libxcb-devel-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082391" comment="libxcb-dpms0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082392" comment="libxcb-dpms0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082395" comment="libxcb-dri2-0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082396" comment="libxcb-dri2-0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082399" comment="libxcb-glx0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082400" comment="libxcb-glx0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082403" comment="libxcb-randr0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082404" comment="libxcb-randr0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082407" comment="libxcb-record0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082408" comment="libxcb-record0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082411" comment="libxcb-render0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082412" comment="libxcb-render0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082415" comment="libxcb-res0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082416" comment="libxcb-res0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082419" comment="libxcb-screensaver0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082420" comment="libxcb-screensaver0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082423" comment="libxcb-shape0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082424" comment="libxcb-shape0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082427" comment="libxcb-shm0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082428" comment="libxcb-shm0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082431" comment="libxcb-sync0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082432" comment="libxcb-sync0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082435" comment="libxcb-xevie0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082436" comment="libxcb-xevie0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082439" comment="libxcb-xf86dri0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082440" comment="libxcb-xf86dri0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082443" comment="libxcb-xfixes0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082444" comment="libxcb-xfixes0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082447" comment="libxcb-xinerama0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082448" comment="libxcb-xinerama0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082451" comment="libxcb-xprint0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082452" comment="libxcb-xprint0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082455" comment="libxcb-xtest0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082456" comment="libxcb-xtest0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082459" comment="libxcb-xv0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082460" comment="libxcb-xv0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082463" comment="libxcb-xvmc0-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082464" comment="libxcb-xvmc0-32bit-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082467" comment="libxcb1-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082468" comment="libxcb1-32bit-1.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:67" version="1" class="patch">
	<metadata>
		<title>update for libXext</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXext fixes several integer overflow issues:
- U_0001-integer-overflow-in-XcupGetReservedColormapEntries-C.patch,
  U_0002-integer-overflow-in-XcupStoreColors-CVE-2013-1982-2-.patch,
  U_0003-several-integer-overflows-in-XdbeGetVisualInfo-CVE-2.patch,
  U_0004-integer-overflow-in-XeviGetVisualInfo-CVE-2013-1982-.patch,
  U_0005-integer-overflow-in-XShapeGetRectangles-CVE-2013-198.patch,
  U_0006-integer-overflow-in-XSyncListSystemCounters-CVE-2013.patch,
  * integer overflow(s) in XcupGetReservedColormapEntries(),
    XcupStoreColors(),  XdbeGetVisualInfo(), XeviGetVisualInfo(),
    XShapeGetRectangles(), XSyncListSystemCounters() [CVE-2013-1982] 
    (bnc#821665, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082471" comment="libXext-1.3.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082473" comment="libXext-devel-1.3.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082474" comment="libXext-devel-32bit-1.3.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082475" comment="libXext6-1.3.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082476" comment="libXext6-32bit-1.3.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:68" version="1" class="patch">
	<metadata>
		<title>update for libXfixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXfixes fixes an integer overflow issue:
- U_0001-integer-overflow-in-XFixesGetCursorImage-CVE-2013-19.patch
  * integer overflow in XFixesGetCursorImage() [CVE-2013-1983]
    (bnc#821667, bnc#815451) 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082479" comment="libXfixes-5.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082481" comment="libXfixes-devel-32bit-5.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082482" comment="libXfixes-devel-5.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082483" comment="libXfixes3-32bit-5.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082484" comment="libXfixes3-5.0-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:69" version="1" class="patch">
	<metadata>
		<title>update for libXp</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXp fixes several integer overflow issues:
- U_0001-integer-overflow-in-XpGetAttributes-XpGetOneAttribut.patch,
  U_0002-integer-overflows-in-XpGetPrinterList-CVE-2013-2062-.patch,
  U_0003-integer-overflows-in-XpQueryScreens-CVE-2013-2062-3-.patch
  * integer overflow(s) in XpGetAttributes/XpGetOneAttribute, 
    XpGetPrinterList() and XpQueryScreens() [CVE-2013-2062]
    (bnc#821668, bnc#815451) 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082487" comment="libXp-1.0.1-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082489" comment="libXp-devel-1.0.1-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082490" comment="libXp-devel-32bit-1.0.1-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082491" comment="libXp6-1.0.1-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082492" comment="libXp6-32bit-1.0.1-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:70" version="1" class="patch">
	<metadata>
		<title>update for libXrender</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXrender fixes several integer overflow issues.
- U_0001-integer-overflow-in-XRenderQueryFilters-CVE-2013-198.patch,
  U_0002-integer-overflow-in-XRenderQueryFormats-CVE-2013-198.patch,
  U_0003-integer-overflow-in-XRenderQueryPictIndexValues-CVE-.patch
  * integer overflow in XRenderQueryFilters(), 
    XRenderQueryFormats() and XRenderQueryPictIndexValues() 
    [CVE-2013-1987] (bnc#821669, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082495" comment="libXrender-0.9.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082497" comment="libXrender-devel-0.9.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082498" comment="libXrender-devel-32bit-0.9.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082499" comment="libXrender1-0.9.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082500" comment="libXrender1-32bit-0.9.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:71" version="1" class="patch">
	<metadata>
		<title>update for libXt</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXt fixes several security issues.
- U_0001-unvalidated-length-in-_XtResourceConfigurationEH-CVE.patch
  * unvalidated length in _XtResourceConfigurationEH [CVE-2013-2002]
    (bnc#821670, bnc#815451) 
- U_0001-Unchecked-return-values-of-XGetWindowProperty-CVE-20.patch
  * Unchecked return values of XGetWindowProperty [CVE-2013-2005]
    (bnc#821670, bnc#815451) 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082503" comment="libXt-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082505" comment="libXt-devel-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082506" comment="libXt-devel-32bit-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082507" comment="libXt6-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082508" comment="libXt6-32bit-1.1.3-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:72" version="1" class="patch">
	<metadata>
		<title>update for libXv</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXrender fixes several buffer and integer overflow issues.
- U_0001-integer-overflow-in-XvQueryPortAttributes-CVE-2013-1.patch,
  U_0002-integer-overflow-in-XvListImageFormats-CVE-2013-1989.patch,
  U_0003-integer-overflow-in-XvCreateImage-CVE-2013-1989-3-3.patch
  * integer overflow in XvQueryPortAttributes(), XvListImageFormats(),
    XvCreateImage() [CVE-2013-1989] (bnc#821671, bnc#815451)
- U_0001-buffer-overflow-in-XvQueryPortAttributes-CVE-2013-20.patch
  * buffer overflow in XvQueryPortAttributes() [CVE-2013-2066]
    (bnc#821671, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082511" comment="libXv-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082513" comment="libXv-devel-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082514" comment="libXv-devel-32bit-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082515" comment="libXv1-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082516" comment="libXv1-32bit-1.0.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:73" version="1" class="patch">
	<metadata>
		<title>update for telepathy-gabble</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of telepathy-gabble fixes a TLS bypass problem.
Changes in telepathy-gabble:
- Add telepathy-gabble-cve-2013-1431.patch (bnc#822586). This makes
  it respect the TLS-required flag on legacy Jabber servers.
  Identified as CVE-2013-1431.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082519" comment="telepathy-gabble-0.17.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082522" comment="telepathy-gabble-xmpp-console-0.17.1-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:74" version="1" class="patch">
	<metadata>
		<title>update for nfs-utils</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of nfs-utils includes several bug and security fixes.
- gssd-reverse-dns-fix: Allow DNS lookups to be
  avoided when determining kerberos identity of
  server.  The GSSD_OPTIONS sysconfig
  variable is added so that use of DNS can
  be enforced for sites that need it.
  (bnc#813464 CVE-2013-1923)
- gssd-n.fix: linux-3.7 changed behaviour of gssd
  lookups so that &amp;quot;gssd -n&amp;quot; isn't sufficient to stop
  the use of &amp;quot;machine credentials&amp;quot;.  This patch
  add &amp;quot;-N&amp;quot; which stops the new use as well.
  Also add GSSD_OPTIONS to sysconfig so these flags
  can be set more easily. (bnc#817651)
- mountd-fix-exporting-of-with-sec-setting.patch
  Fix bug when exporting root filesystem with
  gss security. (bnc#809226)

- mountd-fix-error-check.patch: check for errors
  with exporting filesystems correctly (bnc#809226)

- nfsserver.init: make sure warning about bind=
  being deprecated goes to terminal and not into
  /run/nfs/bind.mounts (bnc#809226)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082524" comment="nfs-client-1.2.7-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082526" comment="nfs-doc-1.2.7-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082527" comment="nfs-kernel-server-1.2.7-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082529" comment="nfs-utils-1.2.7-2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:75" version="1" class="patch">
	<metadata>
		<title>update for subversion</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of subversion includes several bug and security fixes.
- update to 1.7.10 [bnc#821505]
  CVE-2013-1968 CVE-2013-2088 CVE-2013-2112
  - Client-side bugfixes:
    * fix 'svn revert' &amp;quot;no such table: revert_list&amp;quot; spurious error
    * fix 'svn diff' doesn't show some locally added files
    * fix changelist filtering when --changelist values aren't UTF8
    * fix 'svn diff --git' shows wrong copyfrom
    * fix 'svn diff -x-w' shows wrong changes
    * fix 'svn blame' sometimes shows every line as modified
    * fix regression in 'svn status -u' output for externals
    * fix file permissions change on commit of file with keywords
    * improve some fatal error messages
    * fix externals not removed when working copy is made shallow
  - Server-side bugfixes:
    * fix repository corruption due to newline in filename
    * fix svnserve exiting when a client connection is aborted
    * fix svnserve memory use after clear
    * fix repository corruption on power/disk failure on Windows
  - Developer visible changes:
    * make get-deps.sh compatible with Solaris /bin/sh
    * fix infinite recursion bug in get-deps.sh
    * fix uninitialised output parameter of svn_fs_commit_txn()
  - Bindings:
    * fix JavaHL thread-safety bug 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082531" comment="libsvn_auth_gnome_keyring-1-0-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082533" comment="libsvn_auth_kwallet-1-0-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082535" comment="subversion-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082536" comment="subversion-bash-completion-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082539" comment="subversion-devel-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082540" comment="subversion-perl-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082542" comment="subversion-python-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082544" comment="subversion-server-1.7.10-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082546" comment="subversion-tools-1.7.10-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:76" version="1" class="patch">
	<metadata>
		<title>update for autotrace</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of autotrace fixes a buffer overflow issue.
- Fix stack-based buffer overflow in bmp parser
  (CVE-2013-1953.patch, bnc#815382, CVE-2013-1953).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082548" comment="autotrace-0.31.1-637.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082551" comment="autotrace-devel-0.31.1-637.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082552" comment="libautotrace3-0.31.1-637.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:77" version="1" class="patch">
	<metadata>
		<title>update for python-pymongo, python3-pymongo</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of pymongo fixes a null pointer issue.
- Add Fix-null-pointer-when-decoding-invalid-DBRef.patch
  * Fixed user-triggerable NULL pointer dereference due to utter plebbery (CVE-2013-2132, bnc#822798)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082554" comment="python-pymongo-2.4.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082557" comment="python3-pymongo-2.4.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:78" version="1" class="patch">
	<metadata>
		<title>kernel: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The openSUSE 12.3 kernel was updated to fix a critical security issue 
and two reiserfs bugs.

CVE-2013-2850: Incorrect strncpy usage in the network
listening part of the iscsi target driver could have been
used by remote attackers to crash the kernel or execute
code.

This required the iscsi target running on the machine
and the attacker able to make a network connection to it
(aka not filtered by firewalls).

Bugs fixed:
- reiserfs: fix spurious multiple-fill in reiserfs_readdir_dentry
  (bnc#822722).

- reiserfs: fix problems with chowning setuid file w/ xattrs
  (bnc#790920).

- iscsi-target: fix heap buffer overflow on error (CVE-2013-2850,
  bnc#821560).

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082560" comment="kernel-debug-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082561" comment="kernel-debug-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082565" comment="kernel-debug-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082567" comment="kernel-default-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082568" comment="kernel-default-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082572" comment="kernel-default-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082574" comment="kernel-desktop-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082575" comment="kernel-desktop-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082579" comment="kernel-desktop-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082581" comment="kernel-docs-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082582" comment="kernel-ec2-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082583" comment="kernel-ec2-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082587" comment="kernel-ec2-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082589" comment="kernel-pae-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082590" comment="kernel-pae-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082594" comment="kernel-pae-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082596" comment="kernel-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082597" comment="kernel-source-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082598" comment="kernel-source-vanilla-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082599" comment="kernel-syms-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082600" comment="kernel-trace-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082601" comment="kernel-trace-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082605" comment="kernel-trace-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082607" comment="kernel-vanilla-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082610" comment="kernel-vanilla-devel-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082612" comment="kernel-xen-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082613" comment="kernel-xen-base-3.7.10-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082617" comment="kernel-xen-devel-3.7.10-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:79" version="1" class="patch">
	<metadata>
		<title>update for libFS</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libFS fixes an integer overflow issue.
- U_0001-Sign-extension-issue-and-integer-overflow-in-FSOpenS.patch
  * Sign extension issue and integer overflow in FSOpenServer()
    [CVE-2013-1996] (bnc#821663, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082619" comment="libFS-1.0.4-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082621" comment="libFS-devel-1.0.4-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082622" comment="libFS-devel-32bit-1.0.4-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082623" comment="libFS6-1.0.4-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082624" comment="libFS6-32bit-1.0.4-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:80" version="1" class="patch">
	<metadata>
		<title>update for libXcursor</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXcursor fixes an integer overflow issue.
- U_0001-signedness-bug-integer-overflow-in-_XcursorFileHeade.patch
  * signedness bug &amp;amp; integer overflow in _XcursorFileHeaderCreate()
    [CVE-2013-2003] (bnc#821663, bnc#815451) 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082627" comment="libXcursor-1.1.13-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082629" comment="libXcursor-devel-1.1.13-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082630" comment="libXcursor-devel-32bit-1.1.13-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082631" comment="libXcursor1-1.1.13-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082632" comment="libXcursor1-32bit-1.1.13-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:81" version="1" class="patch">
	<metadata>
		<title>update for libXi</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXi fixes several integer overflow issues.
- U_0001-integer-overflow-in-XGetDeviceControl-CVE-2013-1984-.patch,
  U_0002-integer-overflow-in-XGetFeedbackControl-CVE-2013-198.patch,
  U_0003-integer-overflow-in-XGetDeviceDontPropagateList-CVE-.patch,
  U_0004-integer-overflow-in-XGetDeviceMotionEvents-CVE-2013-.patch,
  U_0005-integer-overflow-in-XIGetProperty-CVE-2013-1984-5-8.patch,
  U_0006-integer-overflow-in-XIGetSelectedEvents-CVE-2013-198.patch,
  U_0007-Avoid-integer-overflow-in-XGetDeviceProperties-CVE-2.patch,
  U_0008-Avoid-integer-overflow-in-XListInputDevices-CVE-2013.patch
  * integer overflow in various functions [CVE-2013-1984]
    (bnc#821663, bnc#815451)
- U_0001-sign-extension-issue-in-XListInputDevices-CVE-2013-1.patch
  * sign extension issue in XListInputDevices() [CVE-2013-1995]
    (bnc#821663, bnc#815451)
- U_0001-Stack-buffer-overflow-in-XGetDeviceButtonMapping-CVE.patch,
  U_0002-memory-corruption-in-_XIPassiveGrabDevice-CVE-2013-1.patch,
  U_0003-unvalidated-lengths-in-XQueryDeviceState-CVE-2013-19.patch
  * Stack buffer overflow in XGetDeviceButtonMapping(),
    memory corruption in _XIPassiveGrabDevice(),
    unvalidated lengths in XQueryDeviceState() [CVE-2013-1998]
    (bnc#821663, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082635" comment="libXi-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082637" comment="libXi-devel-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082638" comment="libXi-devel-32bit-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082639" comment="libXi6-1.6.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082640" comment="libXi6-32bit-1.6.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:82" version="1" class="patch">
	<metadata>
		<title>update for libXinerama</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXinerama fixes an integer overflow issue.
- U_0001-integer-overflow-in-XineramaQueryScreens-CVE-2013-19.patch
  * integer overflow in XineramaQueryScreens() [CVE-2013-1985]
    (bnc#821663, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082643" comment="libXinerama-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082645" comment="libXinerama-devel-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082646" comment="libXinerama-devel-32bit-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082647" comment="libXinerama1-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082648" comment="libXinerama1-32bit-1.1.2-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:83" version="1" class="patch">
	<metadata>
		<title>update for libXrandr</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXrandr fixes several integer overflow issues.
- U_0001-integer-overflow-in-XRRQueryOutputProperty-CVE-2013-.patch,
  U_0003-integer-overflow-in-XRRGetOutputProperty-CVE-2013-19.patch,
  * integer overflow in XRRQueryOutputProperty(), 
    XRRGetProviderProperty() [CVE-2013-1986] (bnc#821663, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082651" comment="libXrandr-1.4.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082653" comment="libXrandr-devel-1.4.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082654" comment="libXrandr-devel-32bit-1.4.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082655" comment="libXrandr2-1.4.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082656" comment="libXrandr2-32bit-1.4.0-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:84" version="1" class="patch">
	<metadata>
		<title>update for libXres</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXres fixes several integer overflow issues.
- U_0001-integer-overflow-in-XResQueryClients-CVE-2013-1988-1.patch,
  U_0002-integer-overflow-in-XResQueryClientResources-CVE-201.patch
  * integer overflow in XResQueryClients(), 
    XResQueryClientResources() [CVE-2013-1988] 
    (bnc#821663, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082659" comment="libXRes1-1.0.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082660" comment="libXRes1-32bit-1.0.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082663" comment="libXres-1.0.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082665" comment="libXres-devel-1.0.6-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082666" comment="libXres-devel-32bit-1.0.6-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:85" version="1" class="patch">
	<metadata>
		<title>update for libXtst</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXtst fixes an integer overflow issue.
- U_0001-integer-overflow-in-XRecordGetContext-CVE-2013-2063.patch
  * integer overflow in XRecordGetContext() [CVE-2013-2063]
    (bnc#821663, bnc#815451) 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082667" comment="libXtst-1.2.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082669" comment="libXtst-devel-1.2.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082670" comment="libXtst-devel-32bit-1.2.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082671" comment="libXtst6-1.2.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082672" comment="libXtst6-32bit-1.2.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:86" version="1" class="patch">
	<metadata>
		<title>update for libXvMC</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXvMC fixes several integer overflow issues.
- U_0001-integer-overflow-in-XvMCListSurfaceTypes-CVE-2013-19.patch,
  U_0002-integer-overflow-in-XvMCListSubpictureTypes-CVE-2013.patch
  * integer overflow in XvMCListSurfaceTypes(), 
    XvMCListSubpictureTypes() [CVE-2013-1990]
    (bnc#821663, bnc#815451)
- U_0001-Multiple-unvalidated-assumptions-in-XvMCGetDRInfo-CV.patch
  * Multiple unvalidated assumptions in XvMCGetDRInfo() [CVE-2013-1999]
    (bnc#821663, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082675" comment="libXvMC-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082677" comment="libXvMC-devel-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082678" comment="libXvMC-devel-32bit-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082679" comment="libXvMC1-1.0.7-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082680" comment="libXvMC1-32bit-1.0.7-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:87" version="1" class="patch">
	<metadata>
		<title>update for libXxf86dga</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXxf86dga fixes several buffer and integer overflow issues.
- U_0001-integer-overflow-in-XDGAQueryModes-CVE-2013-1991-1-2.patch,
  U_0002-integer-overflow-underflow-in-XDGASetMode-CVE-2013-1.patch
  * integer overflow in XDGAQueryModes(); integer overflow &amp;amp; underflow
    in XDGASetMode() [CVE-2013-1991] (bnc#821663, bnc#815451)
- U_0001-buffer-overflow-in-XDGAQueryModes-CVE-2013-2000-1-2.patch,
  U_0002-buffer-overflow-in-XDGASetMode-CVE-2013-2000-2-2.patch
  * buffer overflow in XDGAQueryModes(), XDGASetMode() [CVE-2013-2000]
    (bnc#821663, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082683" comment="libXxf86dga-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082685" comment="libXxf86dga-devel-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082686" comment="libXxf86dga-devel-32bit-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082687" comment="libXxf86dga1-1.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082688" comment="libXxf86dga1-32bit-1.1.3-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:88" version="1" class="patch">
	<metadata>
		<title>update for libXxf86vm</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libXxf86vm fixes a memory corruption issue.
- U_0001-memory-corruption-in-XF86VidModeGetGammaRamp-CVE-201.patch
  * memory corruption in XF86VidModeGetGammaRamp() [CVE-2013-2001]
    (bnc#821663, bnc#815451) 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082691" comment="libXxf86vm-1.1.2-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082693" comment="libXxf86vm-devel-1.1.2-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082694" comment="libXxf86vm-devel-32bit-1.1.2-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082695" comment="libXxf86vm1-1.1.2-4.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082696" comment="libXxf86vm1-32bit-1.1.2-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:89" version="1" class="patch">
	<metadata>
		<title>update for libdmx</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libdmx fixes several integer overflow issues.
- U_0001-integer-overflow-in-DMXGetScreenAttributes-CVE-2013-.patch,
  U_0002-integer-overflow-in-DMXGetWindowAttributes-CVE-2013-.patch,
  U_0003-integer-overflow-in-DMXGetInputAttributes-CVE-2013-1.patch,
  * integer overflow in DMXGetScreenAttributes(),
    DMXGetWindowAttributes(), DMXGetInputAttributes() [CVE-2013-1992]
    (bnc#821663, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082699" comment="libdmx-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082701" comment="libdmx-devel-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082702" comment="libdmx-devel-32bit-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082703" comment="libdmx1-1.1.2-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082704" comment="libdmx1-32bit-1.1.2-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:90" version="1" class="patch">
	<metadata>
		<title>update for libX11</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libX11 fixes several security issues. 
- U_0001-integer-overflow-in-_XQueryFont-on-32-bit-platforms-.patch,
  U_0002-integer-overflow-in-_XF86BigfontQueryFont-CVE-2013-1.patch,
  U_0003-integer-overflow-in-XListFontsWithInfo-CVE-2013-1981.patch,
  U_0004-integer-overflow-in-XGetMotionEvents-CVE-2013-1981-4.patch,
  U_0005-integer-overflow-in-XListHosts-CVE-2013-1981-5-13.patch,
  U_0006-Integer-overflows-in-stringSectionSize-cause-buffer-.patch,
  U_0007-integer-overflow-in-ReadInFile-in-Xrm.c-CVE-2013-198.patch,
  U_0008-integer-truncation-in-_XimParseStringFile-CVE-2013-1.patch,
  U_0009-integer-overflows-in-TransFileName-CVE-2013-1981-9-1.patch,
  U_0010-integer-overflow-in-XGetWindowProperty-CVE-2013-1981.patch,
  U_0011-integer-overflow-in-XGetImage-CVE-2013-1981-11-13.patch,
  U_0012-integer-overflow-in-XGetPointerMapping-XGetKeyboardM.patch,
  U_0013-integer-overflow-in-XGetModifierMapping-CVE-2013-198.patch
  * integer overflow in various functions, integer truncation in 
    _XimParseStringFile() [CVE-2013-1981] (bnc#821664, bnc#815451)
- U_0001-unvalidated-lengths-in-XAllocColorCells-CVE-2013-199.patch,
  U_0002-unvalidated-index-in-_XkbReadGetDeviceInfoReply-CVE-.patch,
  U_0003-unvalidated-indexes-in-_XkbReadGeomShapes-CVE-2013-1.patch,
  U_0004-unvalidated-indexes-in-_XkbReadGetGeometryReply-CVE-.patch,
  U_0005-unvalidated-index-in-_XkbReadKeySyms-CVE-2013-1997-5.patch,
  U_0006-unvalidated-index-in-_XkbReadKeyActions-CVE-2013-199.patch,
  U_0007-unvalidated-index-in-_XkbReadKeyBehaviors-CVE-2013-1.patch,
  U_0008-unvalidated-index-in-_XkbReadModifierMap-CVE-2013-19.patch,
  U_0009-unvalidated-index-in-_XkbReadExplicitComponents-CVE-.patch,
  U_0010-unvalidated-index-in-_XkbReadVirtualModMap-CVE-2013-.patch,
  U_0011-unvalidated-index-length-in-_XkbReadGetNamesReply-CV.patch,
  U_0012-unvalidated-length-in-_XimXGetReadData-CVE-2013-1997.patch,
  U_0013-Avoid-overflows-in-XListFonts-CVE-2013-1997-13-15.patch,
  U_0014-Avoid-overflows-in-XGetFontPath-CVE-2013-1997-14-15.patch,
  U_0015-Avoid-overflows-in-XListExtensions-CVE-2013-1997-15-.patch
  * unvalidated index/length in various functions; Avoid overflows
    in XListFonts(), XGetFontPath(), XListExtensions() [CVE-2013-1997]
    (bnc##821664, bnc#815451)
- U_0001-Unbounded-recursion-in-GetDatabase-when-parsing-incl.patch,
  U_0002-Unbounded-recursion-in-_XimParseStringFile-when-pars.patch
  * Unbounded recursion in GetDatabase(), _XimParseStringFile when
    parsing include files [CVE-2013-2004] (bnc##821664, bnc#815451)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082707" comment="libX11-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082708" comment="libX11-6-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082709" comment="libX11-6-32bit-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082712" comment="libX11-data-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082714" comment="libX11-devel-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082715" comment="libX11-devel-32bit-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082716" comment="libX11-xcb1-1.5.0-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082717" comment="libX11-xcb1-32bit-1.5.0-4.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:91" version="1" class="patch">
	<metadata>
		<title>update for darktable</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of darktable fixes a problem inside the embedded libraw version.
- Fix for CVE-2013-2126
  * added backported patch from git master 
    0001-fixed-error-handling-for-broken-full-color-images.patch
    fixes bnc#823114- 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082720" comment="darktable-1.1.3-1.5.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082723" comment="darktable-doc-1.1.3-1.5.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082724" comment="darktable-1.1.3-1.5.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082727" comment="darktable-doc-1.1.3-1.5.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:92" version="1" class="patch">
	<metadata>
		<title>update for wireshark</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of wireshark includes several security and bug fixes.
- update to 1.8.8 [bnc#823932]
  + vulnerabilities fixed:
    * The CAPWAP dissector could crash.
      wnpa-sec-2013-32
    * The GMR-1 BCCH dissector could crash.
      wnpa-sec-2013-33
    * The PPP dissector could crash.
      wnpa-sec-2013-34
    * The NBAP dissector could crash.
      wnpa-sec-2013-35
    * The RDP dissector could crash.
      wnpa-sec-2013-36
    * The GSM CBCH dissector could crash.
      wnpa-sec-2013-37
    * The Assa Abloy R3 dissector could consume excessive memory
      and CPU.
      wnpa-sec-2013-38
    * The HTTP dissector could overrun the stack.
      wnpa-sec-2013-39
    * The Ixia IxVeriWave file parser could overflow the heap.
      wnpa-sec-2013-40
    * The DCP ETSI dissector could crash.
      wnpa-sec-2013-41
  + Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html

      wnpa-sec-2013-24 CVE-2013-3555
      wnpa-sec-2013-25 CVE-2013-3556 CVE-2013-3557
      wnpa-sec-2013-26 CVE-2013-3558
      wnpa-sec-2013-27 CVE-2013-3559
      wnpa-sec-2013-28 CVE-2013-3560
      wnpa-sec-2013-29 CVE-2013-3561 CVE-2013-3562
      wnpa-sec-2013-30 CVE-2013-3561
      wnpa-sec-2013-31 CVE-2013-3561
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082728" comment="wireshark-1.8.8-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082731" comment="wireshark-devel-1.8.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:93" version="1" class="patch">
	<metadata>
		<title>update for phpMyAdmin</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of phpMyAdmin fixes several security issues.
- update to 3.5.8.1 (2013-04-24)
  * [security] Remote code execution (preg_replace), reported by Janek Vind
    (see PMASA-2013-2)
  * [security] Locally Saved SQL Dump File Multiple File Extension Remote Code
    Execution, reported by Janek Vind (see PMASA-2013-3)
- fix for bnc#824301
  * PMASA-2013-2 (CVE-2013-3238)
- fix for bnc#824302
  * PMASA-2013-3 (CVE-2013-3239)
- update to 3.5.8 (2013-04-08)
  * sf#3828 MariaDB reported as MySQL
  * sf#3854 Incorrect header for Safari 6.0
  * sf#3705 Attempt to open trigger for edit gives NULL
  * Use HTML5 DOCTYPE
  * [security] Self-XSS on GIS visualisation page, reported by Janek Vind
    see PMASA-2013-1
  * sf#3800 Incorrect keyhandler behaviour #2
- fix for bnc#814678
  * PMASA-2013-1 (CVE-2013-1937)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082732" comment="phpMyAdmin-3.5.8.1-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:94" version="1" class="patch">
	<metadata>
		<title>update for libraw</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of libraw fixes a security issue.
- security update:
  * CVE-2013-2126.patch [bnc#822665]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082733" comment="libraw-0.14.7-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082735" comment="libraw-devel-0.14.7-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082736" comment="libraw-devel-static-0.14.7-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082737" comment="libraw-tools-0.14.7-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082739" comment="libraw5-0.14.7-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082741" comment="libraw-0.14.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082743" comment="libraw-devel-0.14.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082744" comment="libraw-devel-static-0.14.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082745" comment="libraw-tools-0.14.7-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082747" comment="libraw5-0.14.7-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:95" version="1" class="patch">
	<metadata>
		<title>update for openstack-nova</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of openstack-nova fixes a security vulnerability.
- Add CVE-2013-2030.patch: fix insecure keystone middleware tmpdir
  by default (CVE-2013-2030, bnc#819349).
- Use explicit keystone-signing dir to workaround lp#1181157.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082749" comment="openstack-nova-doc-2012.2.4+git.1363297910.9561484-2.10.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082750" comment="openstack-nova-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082751" comment="openstack-nova-api-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082752" comment="openstack-nova-cert-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082753" comment="openstack-nova-compute-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082754" comment="openstack-nova-network-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082755" comment="openstack-nova-novncproxy-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082756" comment="openstack-nova-objectstore-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082757" comment="openstack-nova-scheduler-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082758" comment="openstack-nova-test-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082759" comment="openstack-nova-vncproxy-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082760" comment="openstack-nova-volume-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082761" comment="python-nova-2012.2.4+git.1363297910.9561484-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082762" comment="python-greenlet-0.4.0-3.3.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082765" comment="python-greenlet-devel-0.4.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:96" version="1" class="patch">
	<metadata>
		<title>update for openstack-swift</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of openstack-swift fixes a security vulnerability.
- Add CVE-2013-2161.patch: fix unchecked user input in Swift XML
  responses (CVE-2013-2161, bnc#824286).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082766" comment="openstack-swift-doc-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082767" comment="openstack-swift-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082768" comment="openstack-swift-account-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082769" comment="openstack-swift-container-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082770" comment="openstack-swift-object-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082771" comment="openstack-swift-proxy-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082772" comment="openstack-swift-test-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082773" comment="python-swift-1.7.4.1+git.1359529903.0ce3e1d-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:97" version="1" class="patch">
	<metadata>
		<title>update for openstack-keystone</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of openstack-keystone fixes two security vulnerabilities.
- Add CVE-2013-2104.patch: fix missing expiration check in Keystone
  PKI token validation (CVE-2013-2104, bnc#821201)
- Add CVE-2013-2157.patch: fix authentication bypass when using
  LDAP backend (CVE-2013-2157, bnc#823783)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082774" comment="openstack-keystone-doc-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082775" comment="openstack-keystone-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082776" comment="openstack-keystone-test-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082777" comment="python-keystone-2012.2.4+git.1363796849.255b1d4-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:98" version="1" class="patch">
	<metadata>
		<title>update for python-keystoneclient</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of python-keystoneclient fixes a security vulnerability.
- Add CVE-2013-2013.patch: allow secure user password update
  (CVE-2013-2013, bnc#817415).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082778" comment="python-keystoneclient-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082779" comment="python-keystoneclient-doc-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082780" comment="python-keystoneclient-test-0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:99" version="1" class="patch">
	<metadata>
		<title>update for fail2ban</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of fail2ban fixes a security vulnerability.
Changes in fail2ban:
- Fixes: Yaroslav Halchenko
   * [6ccd5781] filter.d/apache-{auth,nohome,noscript,overflows} - anchor
     failregex at the beginning (and where applicable at the end).
     Addresses a possible DoS.
     Closes gh#fail2ban/fail2ban#248, CVE-2013-2178, bnc#824710
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082781" comment="fail2ban-0.8.8-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:100" version="1" class="patch">
	<metadata>
		<title>Fix kpasswd UDP ping-pong</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This update fixes a kpasswd UDP ping-pong security bug (CVE-2002-2443).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082782" comment="krb5-doc-1.10.2-10.17.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082783" comment="krb5-mini-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082786" comment="krb5-mini-devel-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082787" comment="krb5-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082788" comment="krb5-32bit-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082789" comment="krb5-client-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082794" comment="krb5-devel-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082795" comment="krb5-devel-32bit-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082796" comment="krb5-plugin-kdb-ldap-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082798" comment="krb5-plugin-preauth-pkinit-1.10.2-10.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082800" comment="krb5-server-1.10.2-10.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:101" version="1" class="patch">
	<metadata>
		<title>update for dbus-1</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This dbus-1 update fixes a security vulnerability.
- Added CVE-2013-2168.patch, fixes referenced vulnerability (bnc#824607)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082802" comment="dbus-1-x11-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082805" comment="dbus-1-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082806" comment="dbus-1-32bit-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082810" comment="dbus-1-devel-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082811" comment="dbus-1-devel-32bit-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082812" comment="dbus-1-devel-doc-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082813" comment="libdbus-1-3-1.6.8-2.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082814" comment="libdbus-1-3-32bit-1.6.8-2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:102" version="1" class="patch">
	<metadata>
		<title>xdm: fixed NULL pointer crash</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

xdm was updated on crypt() NULL pointer crashes:
* Starting with glibc 2.17 (eglibc 2.17), crypt() fails with
  EINVAL (w/ NULL return) if the salt violates specifications.
  Additionally, on FIPS-140 enabled Linux systems, 
  DES/MD5-encrypted passwords passed to crypt() fail with EPERM
  (w/ NULL return).
  If using glibc's crypt(), check return value to avoid a
  possible NULL pointer dereference. (bnc#824884) (CVE-2013-2179)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082817" comment="xdm-1.1.10-14.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:103" version="1" class="patch">
	<metadata>
		<title></title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Empty.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082820" comment="curl-7.28.1-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082823" comment="libcurl-devel-7.28.1-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082824" comment="libcurl4-32bit-7.28.1-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082825" comment="libcurl4-7.28.1-4.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:104" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox: Update to Firefox 22.0 release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

MozillaFirefox was updated to Firefox 22.0 (bnc#825935)

Following security issues were fixed:
  * MFSA 2013-49/CVE-2013-1682/CVE-2013-1683
    Miscellaneous memory safety hazards
  * MFSA 2013-50/CVE-2013-1684/CVE-2013-1685/CVE-2013-1686
    Memory corruption found using Address Sanitizer
  * MFSA 2013-51/CVE-2013-1687 (bmo#863933, bmo#866823)
    Privileged content access and execution via XBL
  * MFSA 2013-52/CVE-2013-1688 (bmo#873966)
    Arbitrary code execution within Profiler
  * MFSA 2013-53/CVE-2013-1690 (bmo#857883)
    Execution of unmapped memory through onreadystatechange event
  * MFSA 2013-54/CVE-2013-1692 (bmo#866915)
    Data in the body of XHR HEAD requests leads to CSRF attacks
  * MFSA 2013-55/CVE-2013-1693 (bmo#711043)
    SVG filters can lead to information disclosure
  * MFSA 2013-56/CVE-2013-1694 (bmo#848535)
    PreserveWrapper has inconsistent behavior
  * MFSA 2013-57/CVE-2013-1695 (bmo#849791)
    Sandbox restrictions not applied to nested frame elements
  * MFSA 2013-58/CVE-2013-1696 (bmo#761667)
    X-Frame-Options ignored when using server push with multi-part
    responses
  * MFSA 2013-59/CVE-2013-1697 (bmo#858101)
    XrayWrappers can be bypassed to run user defined methods in a
    privileged context
  * MFSA 2013-60/CVE-2013-1698 (bmo#876044)
    getUserMedia permission dialog incorrectly displays location
  * MFSA 2013-61/CVE-2013-1699 (bmo#840882)
    Homograph domain spoofing in .com, .net and .name
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082828" comment="MozillaFirefox-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082829" comment="MozillaFirefox-branding-upstream-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082830" comment="MozillaFirefox-buildsymbols-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082833" comment="MozillaFirefox-devel-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082834" comment="MozillaFirefox-translations-common-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082835" comment="MozillaFirefox-translations-other-22.0-1.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082836" comment="mozilla-nspr-32bit-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082837" comment="mozilla-nspr-4.9.6-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082841" comment="mozilla-nspr-devel-4.9.6-1.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:105" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird: 17.0.7 security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
MozillaThunderbird was updated to Thunderbird 17.0.7 (bnc#825935)

Security issues fixed:
  * MFSA 2013-49/CVE-2013-1682
    Miscellaneous memory safety hazards
  * MFSA 2013-50/CVE-2013-1684/CVE-2013-1685/CVE-2013-1686
    Memory corruption found using Address Sanitizer
  * MFSA 2013-51/CVE-2013-1687 (bmo#863933, bmo#866823)
    Privileged content access and execution via XBL
  * MFSA 2013-53/CVE-2013-1690 (bmo#857883)
    Execution of unmapped memory through onreadystatechange event
  * MFSA 2013-54/CVE-2013-1692 (bmo#866915)
    Data in the body of XHR HEAD requests leads to CSRF attacks
  * MFSA 2013-55/CVE-2013-1693 (bmo#711043)
    SVG filters can lead to information disclosure
  * MFSA 2013-56/CVE-2013-1694 (bmo#848535)
    PreserveWrapper has inconsistent behavior
  * MFSA 2013-59/CVE-2013-1697 (bmo#858101)
    XrayWrappers can be bypassed to run user defined methods in a
    privileged context
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082842" comment="MozillaThunderbird-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082843" comment="MozillaThunderbird-buildsymbols-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082846" comment="MozillaThunderbird-devel-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082848" comment="MozillaThunderbird-translations-common-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082849" comment="MozillaThunderbird-translations-other-17.0.7-61.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082850" comment="enigmail-1.5.1+17.0.7-61.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:106" version="1" class="patch">
	<metadata>
		<title>xulrunner: 17.0.7esr security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Mozilla xulrunner was update to 17.0.7esr (bnc#825935)

Security issues fixed:
  * MFSA 2013-49/CVE-2013-1682
    Miscellaneous memory safety hazards
  * MFSA 2013-50/CVE-2013-1684/CVE-2013-1685/CVE-2013-1686
    Memory corruption found using Address Sanitizer
  * MFSA 2013-51/CVE-2013-1687 (bmo#863933, bmo#866823)
    Privileged content access and execution via XBL
  * MFSA 2013-53/CVE-2013-1690 (bmo#857883)
    Execution of unmapped memory through onreadystatechange event
  * MFSA 2013-54/CVE-2013-1692 (bmo#866915)
    Data in the body of XHR HEAD requests leads to CSRF attacks
  * MFSA 2013-55/CVE-2013-1693 (bmo#711043)
    SVG filters can lead to information disclosure
  * MFSA 2013-56/CVE-2013-1694 (bmo#848535)
    PreserveWrapper has inconsistent behavior
  * MFSA 2013-59/CVE-2013-1697 (bmo#858101)
    XrayWrappers can be bypassed to run user defined methods in a
    privileged context
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082852" comment="mozilla-js-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082853" comment="mozilla-js-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082856" comment="xulrunner-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082857" comment="xulrunner-32bit-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082858" comment="xulrunner-buildsymbols-17.0.7-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082862" comment="xulrunner-devel-17.0.7-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:107" version="1" class="patch">
	<metadata>
		<title>update for xorg-x11-server</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This xorg-x11-server update fixes a DoS vulnerability and adds randr support.
- U_os-Reset-input-buffer-s-ignoreBytes-field.patch
  * If a client sends a request larger than maxBigRequestSize,
    the server is supposed to ignore it.
    Before commit cf88363d, the server would simply disconnect
    the client. After that commit, it attempts to gracefully
    ignore the request by remembering how long the client
    specified the request to be, and ignoring that many bytes.
    However, if a client sends a BigReq header with a large size
    and disconnects before actually sending the rest of the
    specified request, the server will reuse the ConnectionInput
    buffer without resetting the ignoreBytes field. This makes
    the server ignore new X clients' requests.
    This fixes that behavior by resetting the ignoreBytes field
    when putting the ConnectionInput buffer back on the
    FreeInputs list. (bnc#815583) 

- u_xserver_xvfb-randr.patch
  * Add randr support to Xvfb (bnc#823410)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082864" comment="xorg-x11-server-7.6_1.13.2-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082867" comment="xorg-x11-server-extra-7.6_1.13.2-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082869" comment="xorg-x11-server-sdk-7.6_1.13.2-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:108" version="1" class="patch">
	<metadata>
		<title>update for python-bugzilla</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This python-bugzilla update fixes a SSL verification issue.
- CVE-2013-2191 (bnc#825876) - validate SSL certificates and hostnames
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082870" comment="python-bugzilla-0.6.2-8.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109" version="1" class="patch">
	<metadata>
		<title>update for nagios</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This nagios update fixes a authorization problem inside host/service views.
- added nagios-CVE-2013-2214.patch fixing unauthorized host/service 
  views displayed in servicegroup view (bnc#827020)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082871" comment="nagios-3.5.0-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082874" comment="nagios-devel-3.5.0-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082875" comment="nagios-www-3.5.0-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082876" comment="nagios-www-dch-3.5.0-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110" version="1" class="patch">
	<metadata>
		<title>update for chromium</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Update to 30.0.1553
  * Bug and stability fixes
  * Includes security update for v8 (bnc821601)
    * CVE-2013-2838 Denial of service (out-of-bounds read) via 
      unspecified vectors

- Add the flag --disable-gpu-sandbox to prevent crashes and/or 
  slowness. The GPU Sandbox is a new sandbox introduces in M28 and
  is currently causing issues 
  (http://code.google.com/p/chromium/issues/detail?id=255063)

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082878" comment="chromedriver-30.0.1553.0-1.7.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082880" comment="chromium-30.0.1553.0-1.7.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082883" comment="chromium-desktop-gnome-30.0.1553.0-1.7.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082884" comment="chromium-desktop-kde-30.0.1553.0-1.7.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082885" comment="chromium-ffmpegsumo-30.0.1553.0-1.7.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082887" comment="chromium-suid-helper-30.0.1553.0-1.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111" version="1" class="patch">
	<metadata>
		<title>update for ruby19</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- fix cve-2013-4073 (bnc#827265)
  The fix_cve-2013-4073.patch contains the patch for
  cve-2013-4073 (bnc#827265) adapted from 
  https://github.com/ruby/ruby/commit/2669b84d407ab431e965145c827db66c91158f89
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082889" comment="ruby19-1.9.3.p392-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082892" comment="ruby19-devel-1.9.3.p392-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082893" comment="ruby19-devel-extra-1.9.3.p392-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082894" comment="ruby19-doc-ri-1.9.3.p392-1.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082895" comment="ruby19-tk-1.9.3.p392-1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112" version="1" class="patch">
	<metadata>
		<title>perl-Module-Signature: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

perl-Module-Signature was updated to 0.73, fixing bugs and security issues:

Security fix for code execution in signature checking:
  * fix for bnc#828010 (CVE-2013-2145)
  * Properly redo the previous fix using File::Spec-&amp;gt;file_name_is_absolute.

- [Changes for 0.72 - Wed Jun  5 23:19:02 CST 2013]
  * Only allow loading Digest::* from absolute paths in @INC,
    by ensuring they begin with \ or / characters.
    Contributed by: Florian Weimer (CVE-2013-2145)
- [Changes for 0.71 - Tue Jun  4 18:24:10 CST 2013]
  * Constrain the user-specified digest name to /^\w+\d+$/.
  * Avoid loading Digest::* from relative paths in @INC.
    Contributed by: Florian Weimer (CVE-2013-2145)
- [Changes for 0.70 - Thu Nov 29 01:45:54 CST 2012]
  * Don't check gpg version if gpg does not exist.
    This avoids unnecessary warnings during installation
    when gpg executable is not installed.
    Contributed by: Kenichi Ishigaki
- [Changes for 0.69 - Fri Nov  2 23:04:19 CST 2012]
  * Support for gpg under these alternate names:
    gpg gpg2 gnupg gnupg2
    Contributed by: Michael Schwern
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082897" comment="perl-Module-Signature-0.73-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:113" version="1" class="patch">
	<metadata>
		<title>seamonkey: 2.19 security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

seamonkey was updated to 2.19 (bnc#825935) to fix bugs and security issues.

Security issues fixed:
  * MFSA 2013-49/CVE-2013-1682/CVE-2013-1683
    Miscellaneous memory safety hazards
  * MFSA 2013-50/CVE-2013-1684/CVE-2013-1685/CVE-2013-1686
    Memory corruption found using Address Sanitizer
  * MFSA 2013-51/CVE-2013-1687 (bmo#863933, bmo#866823)
    Privileged content access and execution via XBL
  * MFSA 2013-52/CVE-2013-1688 (bmo#873966)
    Arbitrary code execution within Profiler
  * MFSA 2013-53/CVE-2013-1690 (bmo#857883)
    Execution of unmapped memory through onreadystatechange event
  * MFSA 2013-54/CVE-2013-1692 (bmo#866915)
    Data in the body of XHR HEAD requests leads to CSRF attacks
  * MFSA 2013-55/CVE-2013-1693 (bmo#711043)
    SVG filters can lead to information disclosure
  * MFSA 2013-56/CVE-2013-1694 (bmo#848535)
    PreserveWrapper has inconsistent behavior
  * MFSA 2013-57/CVE-2013-1695 (bmo#849791)
    Sandbox restrictions not applied to nested frame elements
  * MFSA 2013-58/CVE-2013-1696 (bmo#761667)
    X-Frame-Options ignored when using server push with multi-part
    responses
  * MFSA 2013-59/CVE-2013-1697 (bmo#858101)
    XrayWrappers can be bypassed to run user defined methods in a
    privileged context
  * MFSA 2013-60/CVE-2013-1698 (bmo#876044)
    getUserMedia permission dialog incorrectly displays location
  * MFSA 2013-61/CVE-2013-1699 (bmo#840882)
    Homograph domain spoofing in .com, .net and .name
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082898" comment="seamonkey-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082901" comment="seamonkey-dom-inspector-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082902" comment="seamonkey-irc-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082903" comment="seamonkey-translations-common-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082904" comment="seamonkey-translations-other-2.19-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082905" comment="seamonkey-venkman-2.19-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:114" version="1" class="patch">
	<metadata>
		<title>Mesa: security fixes for Intel drivers</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Mesa was updated to fix a security problem in the Intel drivers, where
potentially remote attackers via 3D models could inject code.

(CVE-2013-1872 - i965: fix problem with constant out of bounds access (bnc #828007).)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082906" comment="Mesa-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082907" comment="Mesa-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082911" comment="Mesa-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082912" comment="Mesa-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082913" comment="Mesa-libEGL-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082914" comment="Mesa-libEGL-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082915" comment="Mesa-libEGL1-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082916" comment="Mesa-libEGL1-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082919" comment="Mesa-libGL-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082920" comment="Mesa-libGL-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082921" comment="Mesa-libGL1-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082922" comment="Mesa-libGL1-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082925" comment="Mesa-libGLESv1_CM-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082926" comment="Mesa-libGLESv1_CM-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082927" comment="Mesa-libGLESv1_CM1-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082928" comment="Mesa-libGLESv1_CM1-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082931" comment="Mesa-libGLESv2-2-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082932" comment="Mesa-libGLESv2-2-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082935" comment="Mesa-libGLESv2-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082936" comment="Mesa-libGLESv2-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082937" comment="Mesa-libIndirectGL-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082938" comment="Mesa-libIndirectGL-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082939" comment="Mesa-libIndirectGL1-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082940" comment="Mesa-libIndirectGL1-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082943" comment="Mesa-libglapi-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082944" comment="Mesa-libglapi-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082945" comment="Mesa-libglapi0-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082946" comment="Mesa-libglapi0-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082949" comment="libOSMesa-devel-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082950" comment="libOSMesa-devel-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082951" comment="libOSMesa9-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082952" comment="libOSMesa9-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082955" comment="libXvMC_nouveau-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082956" comment="libXvMC_nouveau-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082959" comment="libXvMC_r300-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082960" comment="libXvMC_r300-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082963" comment="libXvMC_r600-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082964" comment="libXvMC_r600-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082967" comment="libXvMC_softpipe-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082968" comment="libXvMC_softpipe-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082971" comment="libgbm-devel-0.0.0-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082972" comment="libgbm-devel-32bit-0.0.0-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082973" comment="libgbm1-0.0.0-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082974" comment="libgbm1-32bit-0.0.0-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082977" comment="libvdpau_nouveau-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082978" comment="libvdpau_nouveau-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082981" comment="libvdpau_r300-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082982" comment="libvdpau_r300-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082985" comment="libvdpau_r600-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082986" comment="libvdpau_r600-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082989" comment="libvdpau_softpipe-32bit-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082990" comment="libvdpau_softpipe-9.0.2-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082993" comment="libxatracker-devel-1.0.0-34.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009082994" comment="libxatracker1-1.0.0-34.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:115" version="1" class="patch">
	<metadata>
		<title>python-suds: fixed insecure temp directory usage</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Python SUDS was updated to create a create random cache tempdir to avoid
other local user access (bnc#827568) (CVE-2013-2217)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082996" comment="python-suds-0.4-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:116" version="1" class="patch">
	<metadata>
		<title>qemu: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The qemu guest agent creates a bunch of files with insecure permissions
when started in daemon mode. For now mask all file mode bits for &amp;quot;group&amp;quot; and &amp;quot;others&amp;quot; in
become_daemon(). Temporarily, for compatibility reasons, stick with the 0666 file-mode in
case of files newly created by the &amp;quot;guest-file-open&amp;quot; QMP call. Do so
without changing the umask temporarily.

QEMU was updated to 1.1.2 on openSUSE 12.2, and 1.3.1 on openSUSE 12.3.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009082997" comment="qemu-1.3.1-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083000" comment="qemu-guest-agent-1.3.1-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083002" comment="qemu-linux-user-1.3.1-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083004" comment="qemu-tools-1.3.1-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:117" version="1" class="patch">
	<metadata>
		<title>tinyproxy: security fixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Tinyproxy allowed remote attackers to cause a denial of service (CPU
and memory consumption) via (1) a large number of headers or (2) a large
number of forged headers that trigger hash collisions predictably. bucket.

This update fixes this by limiting headers and improving the hash keying.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083006" comment="tinyproxy-1.8.3-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:118" version="1" class="patch">
	<metadata>
		<title>cgit: security update to fix directory traversal</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
A directory traversal in cgit could be used
  by remote attackers to read files on the local filesystem. (CVE-2013-2117)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083009" comment="cgit-0.9.1-8.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:119" version="1" class="patch">
	<metadata>
		<title>python-django: security update to 1.4.5</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

python-django was updated to 1.4.5 to fix various security issues and bugs.

Update to 1.4.5:
- Security release.
- Fix bnc#807175 / bnc#787521 / CVE-2012-4520 / CVE-2013-0305 /
  CVE-2013-0306 and CVE-2013-1665.

- Update to 1.4.3:
  - Security release:
    - Host header poisoning
    - Redirect poisoning
  - Please check release notes for details:
    https://www.djangoproject.com/weblog/2012/dec/10/security

- Add a symlink from /usr/bin/django-admin.py to /usr/bin/django-admin

- Update to 1.4.2:
  - Security release:
    - Host header poisoning
  - Please check release notes for details:
    https://www.djangoproject.com/weblog/2012/oct/17/security

- Update to 1.4.1:
  - Security release:
    - Cross-site scripting in authentication views
    - Denial-of-service in image validation
    - Denial-of-service via get_image_dimensions()
  - Please check release notes for details:
    https://www.djangoproject.com/weblog/2012/jul/30/security-releases-issued

- Add patch to support CSRF_COOKIE_HTTPONLY config
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080476" comment="python-django-1.4.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:120" version="1" class="patch">
	<metadata>
		<title>java-1_7_0-openjdk: security update to IcedTea 2.4.1</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
java-1_7_0-openjdk was updated to icedtea-2.4.1 (bnc#828665) 
* Security fixes
  - S6741606, CVE-2013-2407: Integrate Apache Santuario
  - S7158805, CVE-2013-2445: Better rewriting of nested subroutine calls
  - S7170730, CVE-2013-2451: Improve Windows network stack support.
  - S8000638, CVE-2013-2450: Improve deserialization
  - S8000642, CVE-2013-2446: Better handling of objects for transportation
  - S8001032: Restrict object access
  - S8001033, CVE-2013-2452: Refactor network address handling in virtual machine identifiers
  - S8001034, CVE-2013-1500: Memory management improvements
  - S8001038, CVE-2013-2444: Resourcefully handle resources
  - S8001043: Clarify definition restrictions
  - S8001308: Update display of applet windows
  - S8001309: Better handling of annotation interfaces
  - S8001318, CVE-2013-2447: Socket.getLocalAddress not consistent with InetAddress.getLocalHost
  - S8001330, CVE-2013-2443: Improve on checking order (non-Zero builds only)
  - S8003703, CVE-2013-2412: Update RMI connection dialog box
  - S8004288, CVE-2013-2449: (fs) Files.probeContentType problems
  - S8004584: Augment applet contextualization
  - S8005007: Better glyph processing
  - S8006328, CVE-2013-2448: Improve robustness of sound classes
  - S8006611: Improve scripting
  - S8007467: Improve robustness of JMX internal APIs
  - S8007471: Improve MBean notifications
  - S8007812, CVE-2013-2455: (reflect) Class.getEnclosingMethod problematic for some classes
  - S8007925: Improve cmsStageAllocLabV2ToV4curves
  - S8007926: Improve cmsPipelineDup
  - S8007927: Improve cmsAllocProfileSequenceDescription
  - S8007929: Improve CurvesAlloc
  - S8008120, CVE-2013-2457: Improve JMX class checking
  - S8008124, CVE-2013-2453: Better compliance testing
  - S8008128: Better API coherence for JMX
  - S8008132, CVE-2013-2456: Better serialization support
  - S8008585: Better JMX data handling
  - S8008593: Better URLClassLoader resource management
  - S8008603: Improve provision of JMX providers
  - S8008607: Better input checking in JMX
  - S8008611: Better handling of annotations in JMX
  - S8008615: Improve robustness of JMX internal APIs
  - S8008623: Better handling of MBeanServers
  - S8008744, CVE-2013-2407: Rework part of fix for JDK-6741606
  - S8008982: Adjust JMX for underlying interface changes
  - S8009004: Better implementation of RMI connections
  - S8009008: Better manage management-api
  - S8009013: Better handling of T2K glyphs
  - S8009034: Improve resulting notifications in JMX
  - S8009038: Improve JMX notification support
  - S8009057, CVE-2013-2448: Improve MIDI event handling
  - S8009067: Improve storing keys in KeyStore
  - S8009071, CVE-2013-2459: Improve shape handling
  - S8009235: Improve handling of TSA data
  - S8009424, CVE-2013-2458: Adapt Nashorn to JSR-292 implementation change
  - S8009554, CVE-2013-2454: Improve SerialJavaObject.getFields
  - S8009654: Improve stability of cmsnamed
  - S8010209, CVE-2013-2460: Better provision of factories
  - S8011243, CVE-2013-2470: Improve ImagingLib
  - S8011248, CVE-2013-2471: Better Component Rasters
  - S8011253, CVE-2013-2472: Better Short Component Rasters
  - S8011257, CVE-2013-2473: Better Byte Component Rasters
  - S8012375, CVE-2013-1571: Improve Javadoc framing
  - S8012421: Better positioning of PairPositioning
  - S8012438, CVE-2013-2463: Better image validation
  - S8012597, CVE-2013-2465: Better image channel verification
  - S8012601, CVE-2013-2469: Better validation of image layouts
  - S8014281, CVE-2013-2461: Better checking of XML signature
  - S8015997: Additional improvement in Javadoc framing
* OpenJDK
  - list to long, please consult NEWS file

- java-1.7.0-openjdk-zero-arch.patch: fix detection of zero arch

- ignore rhino dependencies during a build to prevent a build cycle 

- update to icedtea-2.4.0 (based on oracle jdk7u40)
* OpenJDK (see NEWS for full listing)
  - PR1209, S7170638: Use DTRACE_PROBE[N] in JNI Set and SetStatic Field.
  - PR1206, S7201205: Add Makefile configuration option to build with unlimited crypto in OpenJDK
* Backports
  - PR1197, S8003120, RH868136: ResourceManager.getApplicationResources() does not close InputStreams
  - S8014618, RH962568: Need to strip leading zeros in TlsPremasterSecret of DHKeyAgreement
* Bug fixes
  - PR1212: IcedTea7 fails to build because Resources.getText() is no longer available for code to use
  - Add NSS (commented out) to other platforms.
  - Allow multiple PKCS11 library initialisation to be a non-critical error.
  - Complete switch from local zlib patch to upstream version.
  - Include defs.make in buildtree.make so ZERO_BUILD is recognised and JVM_VARIANT_ZERO set.
  - Provide support for using PKCS11 provider with NSS
  - Remove file apparently removed as part of upstreaming of Zero.
  - Revert 7060849
  - Set UNLIMITED_CRYPTO=true to ensure we use the unlimited policy.
  - PR473: Set handleStartupErrors to ignoreMultipleInitialisation in nss.cfg
  - PR716: IcedTea7 should bootstrap with IcedTea6
  - Expand java.security.cert.* imports to avoid conflict when building with OpenJDK 6.
  - Fix indentation on Makefile block not executed when STRIP_POLICY=no_strip is set
  - Fix invalid XSL stylesheets and DTD introduced as part of JEP 167.
  - Include defs.make in buildtree.make so ZERO_BUILD is recognised and JVM_VARIANT_ZERO set.
  - Make sure libffi cflags and libs are used.
  - PR1378: Add AArch64 support to Zero
  - PR1170: Ensure unlimited crypto policy is in place.
  - RH513605, PR1280: Updating/Installing OpenJDK should recreate the shared class-data archive
  - PR1358: Make XRender mandatory
  - PR1360: Check for /usr/lib64 JVMs and generic JPackage alternative
  - PR1435, D657854: OpenJDK 7 returns incorrect TrueType font metrics
  - PR728: GTKLookAndFeel does not honor gtk-alternative-button-order
* JamVM
  - JSR 335: (lambda expressions) initial hack
  - JEP 171: Implement fence methods in sun.misc.Unsafe
  - Fix invokesuper check in invokespecial opcode
  - Fix non-direct interpreter invokespecial super-class check
  - When GC'ing a native method don't try to free code
  - Do not free unprepared Miranda method code data
  - Set anonymous class protection domain
  - JVM_IsVMGeneratedMethodIx stub
  - Dummy implementation of sun.misc.Perf natives
- separate vm for zero is no longer needed
- drop java-1.7.0-openjdk-aarch64.patch (upstream: PR1378)

- fix bnc#781690c#11 - setup JAVA_HOME in posttrans, so certificates
  will be created by this JVM
- fix the postrans conditions (add missing prefiX)
- relax build requires, so every java-devel &amp;gt;= 1.7.0 can match
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083012" comment="java-1_7_0-openjdk-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083015" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083017" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083019" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083020" comment="java-1_7_0-openjdk-src-1.7.0.6-8.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:121" version="1" class="patch">
	<metadata>
		<title>libxml2: security update to fix out of bounds reads</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Libxml2 was updated to fix buffer overread problems which could lead to
crashes (out of bounds read). (CVE-2013-2877)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083021" comment="libxml2-2-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083022" comment="libxml2-2-32bit-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083025" comment="libxml2-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083027" comment="libxml2-devel-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083028" comment="libxml2-devel-32bit-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083029" comment="libxml2-doc-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083030" comment="libxml2-tools-2.9.0-2.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083032" comment="python-libxml2-2.9.0-2.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:122" version="1" class="patch">
	<metadata>
		<title>update for nagstamon</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- update to 0.9.10:
  + added fullscreen option
  + added Thruk support
  + added Check_MK cookie-based auth
  + added new Centreon autologin option
  + added configurable default sort order
  + added filter for hosts in hard/soft state for Nagios, Icinga, 
    Opsview and Centreon
  + added $STATUS-INFO$ variable for custom actions
  + added audio alarms also in fullscreen mode
  + improved update interval set in seconds instead minutes
  + improved Icinga JSON support
  + improved Centreon 2.4 xml/broker support
  + improved Nagios 3.4 pagination support
  + improved nicer GTK theme Murrine on MacOSX
  + fixed security bug
  + fixed some memory leaks
  + fixed superfluous passive icon for Check_MK
  + fixed blocking of shutdown/reboot on MacOSX
  + fixed saving converted pre 0.9.9 config immediately
  + fixed statusbar position when offscreen
  + fixed some GUI issues
  + fixed update detection
- this version fixes a security bug in the automatic update check 
  (mentioned in CVE-2013-4114 and bnc #829217)

- fix build on CentOS &amp;gt; 5

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083035" comment="nagstamon-0.9.10-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:123" version="1" class="patch">
	<metadata>
		<title>update for php5</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- fixing the following security issues:
  * CVE-2013-4635.patch (bnc#828020):
    - Integer overflow in the SdnToJewish
  * CVE-2013-1635.patch and CVE-2013-1643.patch (bnc#807707):
    - reading system files via untrusted SOAP input
    - soap.wsdl_cache_dir function did not honour PHP open_basedir
  * CVE-2013-4113.patch (bnc#829207):
    - heap corruption due to badly formed xml
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083036" comment="apache2-mod_php5-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083038" comment="php5-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083039" comment="php5-bcmath-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083041" comment="php5-bz2-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083043" comment="php5-calendar-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083045" comment="php5-ctype-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083047" comment="php5-curl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083049" comment="php5-dba-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083053" comment="php5-devel-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083054" comment="php5-dom-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083056" comment="php5-enchant-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083058" comment="php5-exif-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083060" comment="php5-fastcgi-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083062" comment="php5-fileinfo-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083064" comment="php5-fpm-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083066" comment="php5-ftp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083068" comment="php5-gd-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083070" comment="php5-gettext-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083072" comment="php5-gmp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083074" comment="php5-iconv-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083076" comment="php5-imap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083078" comment="php5-intl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083080" comment="php5-json-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083082" comment="php5-ldap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083084" comment="php5-mbstring-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083086" comment="php5-mcrypt-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083088" comment="php5-mssql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083090" comment="php5-mysql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083092" comment="php5-odbc-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083094" comment="php5-openssl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083096" comment="php5-pcntl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083098" comment="php5-pdo-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083100" comment="php5-pear-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083101" comment="php5-pgsql-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083103" comment="php5-phar-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083105" comment="php5-posix-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083107" comment="php5-pspell-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083109" comment="php5-readline-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083111" comment="php5-shmop-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083113" comment="php5-snmp-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083115" comment="php5-soap-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083117" comment="php5-sockets-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083119" comment="php5-sqlite-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083121" comment="php5-suhosin-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083123" comment="php5-sysvmsg-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083125" comment="php5-sysvsem-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083127" comment="php5-sysvshm-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083129" comment="php5-tidy-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083131" comment="php5-tokenizer-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083133" comment="php5-wddx-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083135" comment="php5-xmlreader-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083137" comment="php5-xmlrpc-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083139" comment="php5-xmlwriter-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083141" comment="php5-xsl-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083143" comment="php5-zip-5.3.17-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083145" comment="php5-zlib-5.3.17-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:124" version="1" class="patch">
	<metadata>
		<title>update for kdebase4-workspace</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Added changeset_ra2bab28a.diff from upstream 4.11 branch, fixes
  kde#321576
- Added kdm-kcheckpass-Check-for-NULL-return-from-crypt-3-an.patch,
  (bnc#829857, CVE-2013-4132)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083147" comment="kde4-kgreeter-plugins-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083149" comment="kdebase4-workspace-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083150" comment="kdebase4-workspace-branding-upstream-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083153" comment="kdebase4-workspace-devel-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083155" comment="kdebase4-workspace-ksysguardd-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083157" comment="kdebase4-workspace-liboxygenstyle-32bit-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083158" comment="kdebase4-workspace-liboxygenstyle-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083161" comment="kdebase4-workspace-plasma-calendar-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083163" comment="kdm-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083164" comment="kdm-branding-upstream-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083166" comment="kwin-4.10.5-1.111.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083168" comment="python-kdebase4-4.10.5-1.111.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:125" version="1" class="patch">
	<metadata>
		<title>lcms2: updated to 2.5 to fix several security issues and bugs</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This version update of lcms2 to release 2.5 fixes several security issues plus several other color management bugs.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009080612" comment="lcms2-2.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080615" comment="liblcms2-2-2.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080616" comment="liblcms2-2-32bit-2.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080619" comment="liblcms2-devel-2.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080620" comment="liblcms2-devel-32bit-2.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009080621" comment="liblcms2-doc-2.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:126" version="1" class="patch">
	<metadata>
		<title>srtp: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

A buffer overflow in srtp was fixed which could potentially be used by attackers to crash
srtp using applications and potentially execute code (CVE-2013-2139, bnc828009).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083169" comment="libsrtp1-1.4.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083171" comment="srtp-1.4.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083173" comment="srtp-devel-1.4.4-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:127" version="1" class="patch">
	<metadata>
		<title>file-roller: security update to sanitize path names</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

  The GNOME file-roller archive tool was updated to fix a path traversal issue while unpacking (CVE-2013-4668).
  File Roller now sanitizes path names while unpacking, so that a path traversal attack cannot be used to
  create files outside the unpack destination directory.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083174" comment="file-roller-3.6.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083177" comment="file-roller-lang-3.6.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083178" comment="nautilus-file-roller-3.6.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:128" version="1" class="patch">
	<metadata>
		<title>subversion: update to 1.7.11</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Subversion was updated to 1.7.11 [bnc#830031] to fix bugs
and security issues.
* translation updates for Simplified Chinese
* mod_dav_svn: fix incorrect path canonicalization (CVE-2013-4131)
* javahl bindings: fix bug in error constructing code
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083180" comment="libsvn_auth_gnome_keyring-1-0-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083182" comment="libsvn_auth_kwallet-1-0-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083184" comment="subversion-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083185" comment="subversion-bash-completion-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083188" comment="subversion-devel-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083189" comment="subversion-perl-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083191" comment="subversion-python-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083193" comment="subversion-server-1.7.11-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083195" comment="subversion-tools-1.7.11-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:129" version="1" class="patch">
	<metadata>
		<title>tomcat: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

  Tomcat was updated to fix two security issues:
  
  CVE-2013-1976: Avoid a potential symlink race during
  startup of the tomcat server, where a local attacker that gaine
  access to the tomcat chroot could escalate privileges to root.

  CVE-2013-2071: java/org/apache/catalina/core/AsyncContextImpl.java
  in Apache Tomcat 7.x did not properly handle the throwing of a
  RuntimeException in an AsyncListener in an application, which allows
  context-dependent attackers to obtain sensitive request information
  intended for other applications in opportunistic circumstances via an
  application that records the requests that it processes.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090978" comment="tomcat-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090979" comment="tomcat-admin-webapps-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090980" comment="tomcat-docs-webapp-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090981" comment="tomcat-el-2_2-api-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090982" comment="tomcat-javadoc-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090983" comment="tomcat-jsp-2_2-api-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090984" comment="tomcat-jsvc-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090985" comment="tomcat-lib-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090986" comment="tomcat-servlet-3_0-api-7.0.35-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090987" comment="tomcat-webapps-7.0.35-2.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:130" version="1" class="patch">
	<metadata>
		<title>libgcrypt: update to 1.5.3</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

libgcrypt was updated to 1.5.3 [bnc#831359] to fix 
a security issue, bugs and get some new features:

Security issue fixed:
* Mitigate the Yarom/Falkner flush+reload side-channel attack on
   RSA secret keys.  See &amp;lt;http://eprint.iacr.org/2013/448&amp;gt;.

- contains changes from 1.5.2
 * The upstream sources now contain the IDEA algorithm, dropping:
   idea.c.gz
   libgcrypt-1.5.0-idea.patch
   libgcrypt-1.5.0-idea_codecleanup.patch
 * Made the Padlock code work again (regression since 1.5.0).
 * Fixed alignment problems for Serpent.
 * Fixed two bugs in ECC computations.
- add GPL3.0+ to License tag because of dumpsexp (bnc#810759) 
- contains changes from 1.5.1
 * Allow empty passphrase with PBKDF2.
 * Do not abort on an invalid algorithm number in
   gcry_cipher_get_algo_keylen and gcry_cipher_get_algo_blklen.
 * Fixed some Valgrind warnings.
 * Fixed a problem with select and high fd numbers.
 * Improved the build system
 * Various minor bug fixes.
 * Interface changes relative to the 1.5.0 release:
   GCRYCTL_SET_ENFORCED_FIPS_FLAG         NEW.
   GCRYPT_VERSION_NUMBER                  NEW.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083207" comment="libgcrypt-1.5.3-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083209" comment="libgcrypt-devel-1.5.3-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083210" comment="libgcrypt-devel-32bit-1.5.3-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083213" comment="libgcrypt11-1.5.3-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083214" comment="libgcrypt11-32bit-1.5.3-12.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:131" version="1" class="patch">
	<metadata>
		<title>wireshark: security update to 1.8.9</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Wireshark was updated to 1.8.9 [bnc#831718]
+ vulnerabilities fixed:
  * The Bluetooth SDP dissector could go into a large loop
    CVE-2013-4927 wnpa-sec-2013-45
  * The DIS dissector could go into a large loop
    CVE-2013-4929 wnpa-sec-2013-47
  * The DVB-CI dissector could crash
    CVE-2013-4930 wnpa-sec-2013-48
  * The GSM RR dissector (and possibly others) could go into a large loop
    CVE-2013-4931 wnpa-sec-2013-49
  * The GSM A Common dissector could crash
    CVE-2013-4932 wnpa-sec-2013-50
  * The Netmon file parser could crash
    CVE-2013-4933 CVE-2013-4934 wnpa-sec-2013-51
  * The ASN.1 PER dissector could crash
    CVE-2013-4935 wnpa-sec-2013-52
+ Further bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009083217" comment="wireshark-1.8.9-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009083220" comment="wireshark-devel-1.8.9-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:132" version="1" class="patch">
	<metadata>
		<title>update for apache2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- httpd-2.2.x-bnc829056-CVE-2013-1896-pr1482522-mod_dav.diff
  CVE-2013-1896: Sending a MERGE request against a URI handled by
  mod_dav_svn with the source href (sent as part of the request
  body as XML) pointing to a URI that is not configured for DAV will
  trigger a segfault. [bnc#829056]
- httpd-2.2.x-bnc829057-CVE-2013-1862-mod_rewrite_terminal_escape_sequences.diff
  CVE-2013-1862: client data written to the RewriteLog must have
  terminal escape sequences escaped. [bnc#829057]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089965" comment="apache2-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089968" comment="apache2-devel-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089969" comment="apache2-doc-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089970" comment="apache2-event-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089972" comment="apache2-example-pages-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089973" comment="apache2-itk-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089975" comment="apache2-prefork-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089977" comment="apache2-utils-2.2.22-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089979" comment="apache2-worker-2.2.22-10.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:133" version="1" class="patch">
	<metadata>
		<title>otrs: 3.1.18 update to fix security issues and bugs</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The ticket system OTRS was updated to 3.1.18 to fix various bugs 
and security issues.

Update to 3.1.18:
  * OSA-2013-05, CVE-2013-4717, CVE-2013-4718 fixed.
  * Fixed bug#9561 - ACL restriction with CustomerID for DynamicFields at new
    Ticket screen not working.
  * Fixed bug#9425 - Wrong created date for queue view.
  * Fixed bug#9125 - AgentTicketSearch dialog does not expand when choosing
    more search criteria.
  * Fixed bug#8273 - Copying text in preview mode not possible.
  * Fixed bug#9557 - Cannot see quoted text in customer ticket zoom.
  * Fixed bug#9011 - GenericInterface: New value after value mapping can't be 0.
  * Improved parameter quoting in various places.
  * Fixed bug#9104 - Group permission for customer subset overwrites permissions
    for other customers.
  * Fixed bug#8719 - PasswordMin2Lower2UpperCharacters problem.
 - 3.1.17
   * Fixed OSA-2013-04, CVE-2013-4088.
   * Improved permission checks in AgentTicketWatcher.
   * Fixed bug#9503 - no connection header in soap responses.
   * Added parameter &amp;quot;-t dbonly&amp;quot; to backup.pl to only backup the database
   * Fixed bug#9491 - GenericAgent job update with dynamic fields sends
     Uninitialized value error.
   * Fixed bug#9462 - Package Management page timeout due to HTTPS disabled on
     Proxy connections.
 - 3.1.16
   * Fixed OSA-2013-03, CVE-2013-3551.
   * Updated Package Manager, that will ensure that packages to be installed
     meet the quality standards of OTRS Group. This is to guarantee that your
     package wasn’t modified, which may possibly harm your system or have an
     influence on the stability and performance of it. All independent package
     contributors will have to conduct a check of their Add-Ons by OTRS Group
     in order to take full advantage of the OTRS package verification.
   * Fixed bug#9387 - Error in a condition with dynamic fields in
     NotificationEvent.
   * Fixed bug#9286 - Ticket::ChangeOwnerToEveryone isn't functional, After a
     AJAX Load the setting is ignored.
   * Fixed bug#7518 - Escalation Notify by not working properly (follow-up fix).
   * Fixed bug#7478 - Got an external answer to an internal mail.
   * Improved permission checks in AgentTicketPhone.
   * Fixed bug#[9360](http://bugs.otrs.org/show_bug.cgi?id=9360) -
     DynamicField Names shown in CSV output.
   * Fixed bug#9384 - Problem with Method ServiceParentsGet of ServiceObject.
   * Fixed bug#9072 - Reply to email-internal includes customer users email in
     Cc. field.
 - 3.1.15
   * Added Malay translation.
   * Fixed bug#8960 - AgentTicketSearch.pm SearchProfile problem.
   * Fixed bug#9182 - Customer Search Function -&amp;gt; If you go into a ticket
     and go back you got not the search results.
   * Fixed bug#9198 - Linked search with fulltext AND additional attributes.
   * Fixed bug#9295 - Article dynamic field is not searchable.
   * Fixed bug#9312 - LinkObject permission check problem.
 - 3.1.14
   * Fixed for OSA-2013-01, CVE-2013-2625.
   * Fixed bug#9257 - No notifications to agents with out-of-office set but
     period not reached.
   * Improved permission checks in LinkObject.
   * Fixed bug#9191 - When ticket types are restricted, first available type
     is selected in AgentTicketActionCommon-based screens.
   * Updated Turkish translation, thanks to Sefer Şimşek / Network Group!
   * Fixed bug#9214 - IE10: impossible to open links from rich text articles.
   * Fixed bug#9218 - Cannot use special characters in TicketHook.
   * Fixed bug#9056 - Unused SysConfig option Ticket::Frontend::CustomerInfoQueueMaxSize.
   * Follow-up fix for bug#8533 apache will not start on Fedora.
   * Fixed bug#9172 - Generic Interface does not work on IIS 7.0.
   * Updated Czech language translation, thanks to Katerina Bubenickova!
   * Fixed bug#8865 - Additional empty data column in statistics CSV-Output.
- update OTRS::ITSM to 3.1.10
  (fix for OSA-2013-05, CVE-2013-4717, CVE-2013-4718)
 - update OTRS::ITSM to 3.1.9
   (fix for OSA-2013-03, CVE-2013-3551)
 - update OTRS::ITSM to 3.1.8
   (fix for OSA-2013-01, CVE-2013-2625)
   (fix for OSA-2013-02, CVE-2013-2637)

- update to 3.1.13
 - http://www.otrs.com/en/open-source/community-news/releases-notes/
    release-notes-otrs-help-desk-3113/
 - http://source.otrs.org/viewvc.cgi/otrs/CHANGES?revision=1.2260.2.206&amp;amp;view=markup
  * Fixed bug#9162 - Setting the start day of the week for the datepicker to
    Sunday does not work.
  * Fixed bug#9141 - Confused Columns in CustomerTicketSearch (ResultShort).
  * Fixed bug#9146 - Signed SMIME mails with altered content shows a not clear
    message.
  * Fixed bug#9145 - SMIME sign verification errors are not displayed in TicketZoom.
  * Fixed bug#9140 - Postmaster Filter for empty subjects does not work.
  * Fixed bug#9121 - Filenames with Unicode NFD are incorrectly reported as NFC
    by Main::DirectoryRead().
  * Fixed bug#9108 - Check for opened/closed tickets not working with
    Ticket::SubjectFormat = Right.
  * Fixed bug#8839 - DateChecksum followup doesn't get correctly SystemID.
  * Updated Russian translation, thanks to Vadim Goncharov!
  * Fixed bug#9101 - Not possible to create dropdown with autocomplete attribute.
  * Fixed bug#9096 - All services list is shown instead of only default services.
  * Fixed bug#8470 - otrs.GenericAgent.pl reports: Can't open
    '/opt/otrs/otrs_vemco/var/tmp/CacheFileStorable/DynamicField/f3b7e10730fb6c9cab5ae0e7f7e034f3'.
  * Added new translation for Spanish (Colombia), thanks to John Edisson Ortiz Roman!
  * Fixed bug#9054 - Link Object deletes all links under certain conditions.
  * Fixed bug#8944 - do not backup the cache.
  * Fixed bug#9057 - Generating a PDF with bin/otrs.GenerateStats.pl produces lots
    of warnings.
  * Fixed bug#8929 - Fix problems with empty ticket search results while
    Ticket::Frontend::AgentTicketSearch###ExtendedSearchCondition is inactive.
  * Fixed bug#9042 - Add X-Spam-Score to Ticket.xml.
  * Fixed bug#9047 - HistoryTicketGet caches info on disk directly.
  * Fixed bug#8923 - Alert message shown, if parent window is reloaded while
    bulk action popup is open.
  * Fixed bug#9030 - Wrong handling of Invalid YAML in Scheduler Tasks.
  * Updated CKEditor to version 3.6.6.
  * Updated Polish translation, thanks to Pawel @ ib.pl!
  * Follow-up fix for bug#8805 - Cron missing as RPM dependency on RHEL.
    Changed dependency on 'anacron' to 'vixie-cron' on RHEL5.
  * Fixed bug#9020 - Generic Ticket Connector does not support attachments with
    ContentType without charset.
  * Fixed bug#8545 - Attachment download not possible if pop up of another action is open.
  * Fixed bug#9009 - Empty Multiselect Dynamic Fields provokes an error.
  * Fixed bug#8589 - Bulk-Action not possible for single ticket.
  * Fixed bug#7198 - Broken repository selection width in Package Manager.
  * Fixed bug#8457 - Error if accessing AgentTicketSearch from AgentTicketPhone in IE8.
  * Fixed bug#8695 - Table head of Customer Ticket History does not resize on window resize.
  * Fixed bug#8533 - Apache will not start if you use mod_perl on Fedora 16 or 17.
  * Fixed bug#8974 - Event Based Notification does not populate REALNAME with
    Customer User data.

- update to 3.1.12
  * Fixed bug#8933 - ArticleStorageInit permission check problem.
  * Fixed bug#8763 - Please add charset conversion for customer companies.
  * Fixed bug#1970 - Email attachments of type .msg (Outlook-Message) are converted.
  * Fixed bug#8955 - Init script might fail on SUSE.
  * Fixed bug#8936 - Ticket close date is empty when ticket is created in closed state.
  * Fixed bug#8937 - &amp;quot;$&amp;quot; should be escaped in interpolated strings when javascript is meant.
  * Fixed bug#8919 - Customer interface search results: ticket can only be accessed
    via ticket number and subject.
  * Fixed bug#8850 - CustomerTicketOverview - MouseOver Age isn't always correct.
  * Fixed bug#8868 - Event Based Notification problem saving 'text' Dynamic Fields.
  * Fixed bug#8914 - Syntax error in hash loop in TicketGet operation.
  * Fixed bug#8749 - CustomerFrontend: missing dynamicfield in search results.
  * Fixed bug#8873 - Bad example of customization of &amp;quot;static&amp;quot; dynamic fields in
    AgentTicketOverviewSmall.
  * Fixed bug#8791 - IMAPTLS fails with some Microsoft Exchange servers.
  * Fixed bug#8841 - Search for Dynamic Fields shows all tickets (on &amp;quot;enter&amp;quot; key pressed).
  * Fixed bug#8861 - Ticket History overlaid calender choice function.
  * Fixed bug#8862 - GI debugger GUI does not show SOAP XML tags correctly.
  * Fixed bug#8566 - Cannot download attachment if filename has character #.
  * Fixed bug#8833 - Article table in TicketZoom does not scroll correctly.
  * Fixed bug#8673 - Richtext-Editor popups broken on Customer-Interface.
  * Fixed bug#8859 - Package upgrade does not work if an installed testpackage
    should be upgraded with a newer regular package.
  * Fixed bug#8678 - 'WidgetAction Toggle' is always shown as 'Expanded' when nesting elements
  * Fixed bug#8378 - Validation fails if the ID of the element contains a dot (.) or a
    colon (:)
  * Fixed bug#8847 - Inline PGP message description routine does not add any info, thanks
    to IB Development Team.
  * Fixed bug#8848 - AgentTicketEmail does not preserve PGP Signatures set if attachment
    is added.
  * Fixed bug#8149 - Wrong handling of subject when SubjectFormat=right.
  * Updated Polish translation, thanks to Pawel!
  * Fixed bug#8820 - Service rcotrs restart fails because a race condition happens.
  * Fixed bug#8819 - Syntax error (stop crontab command) in SuSE rc script.
  * Removed auto cleanup of expired sessions in CreateSessionID() to improve the scalability
    of the hole system.
  * Fixed bug#8667 - TicketSplit does not use QueueID of old Ticket for ACL Checking.
  * Fixed bug#8780 - 508 Compliance: Text descriptions of &amp;quot;Responsible Tickets&amp;quot;
    and &amp;quot;Locked Tickets&amp;quot; links are insufficient for screen reader users.
  * Fixed bug#8812 - Encrypted email doesn't see properly in Outlook.
  * Fixed bug#8214 - OTRS Init script on Red Hat fails to check scheduler.
  * Fixed bug#8850 - Cron missing as RPM dependency on Red Hat Enterprise Linux.
  * Fixed bug#7274 - Ticket QueueView sorts by priority on first page but subsequent
    pages sort incorrectly by Age.
  * Fixed bug#8792 - TriggerEscalationStopEvents logs as loglevel 'error'.
  * Fixed bug#8743 - AgentTicketCompose.pm creates To, CC, BCC filelds without
    spaces after comma.
  * Fixed bug#8606 - Escalation notifications should not be sent to agents who
    are set out-of-office.
  * Fixed bug#8740 - backup.pl: insufficient handling of system() return values.
  * Fixed bug#8622 - Storing a new GI Invoker or Operation with an existing name doesn't
    complain anything.
  * Fixed bug#8770 - AJAX Removes Default Options (follow-up fix).
  * Improved caching for Services and Service Lists.
- Update ITSM to 3.1.7
 - News
  * In AgentTicketZoom the service and the sla are now shown as links
    to the service zoom / sla zoom screens.
  * Updated Polish translation, thanks to Pawel!
  * Added feature in bin/otrs.ITSMConfigItemDelete.pl script to delete
    config items by class together with the deployment state.
  * Added CustomerCompany field type that allows to link CI's with
    Customer Companies registered in OTRS.
  * Enhanced Import/Export screen to show a summary after importing.
  * Added new optional sysconfig option to check if config item names
    are unique.
  * Added attachment support for ITSM config items. This will replace
    the OTRS FeatureAddOn OTRSCIAttachment. Please uninstall this
    FeatureAddon BEFORE you upgrade to OTRS::ITSM 3.1.7
    (no attachment data will be lost)!
 - Bug Fixes
  * Bug# 5928 - Print PDF: Newline not interpreted.
  * Bug# 8723 - Setting the planned start and planned end time to the same value causes an error.
  * Bug# 8785 - Poor performance of ServiceGet with many child services.
  * Bug# 8626 - AgentTicketAddtlITSMField, Ticket states set to first state after reload.
  * Bug# 8852 - No Impact and Criticality in CustomerTicketZoom.
  * Bug# 7786 - Search by &amp;quot;type&amp;quot; not displaying correct results from page 2 on.
  * Bug# 8804 - Reorder of workorders based on actual startime.
  * Bug# 8686 - CI-Search can not handle &amp;gt; 1000 CIs per class
  * Bug# 8863 - Problem with ChangeManagement DropDowns in Conditions Mask.
  * Bug# 8834 - Broken changes created from template when no time offset.
  * Bug# 8830 - CI version header should be clickable in all columns.
  * Bug# 8613 - Wrong date if a workorder has been created from a template.
  * Bug# 8881 - Searching for a config item number = 0 or a config item
    name = 0 (without wildcards) finds results where it should not.
  * Bug# 8882 - Error message from ToolBarMyCAB.
  * Bug# 8614 - Update agent notification doesn't contain agent name.
  * Bug# 8615 - Notification not sent for ChangeStateUpdate to pending PIR.
  * Bug# 7508 - Autocomplete uses milliseconds rather than seconds.
- rebase perm patch
- fix changes file
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089981" comment="otrs-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089982" comment="otrs-doc-3.1.18-26.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089983" comment="otrs-itsm-3.1.10-26.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:134" version="1" class="patch">
	<metadata>
		<title>update for apache2-mod_security2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- complete overhaul of this package, with update to 2.7.5.
- ruleset update to 2.2.8-0-g0f07cbb.
- new configuration framework private to mod_security2:
  /etc/apache2/conf.d/mod_security2.conf loads
  /usr/share/apache2-mod_security2/rules/modsecurity_crs_10_setup.conf,
  then /etc/apache2/mod_security2.d/*.conf , as set up based on
  advice in /etc/apache2/conf.d/mod_security2.conf
  Your configuration starting point is
  /etc/apache2/conf.d/mod_security2.conf
- !!! Please note that mod_unique_id is needed for mod_security2 to run!
- modsecurity-apache_2.7.5-build_fix_pcre.diff changes erroneaous
  linker parameter, preventing rpath in shared object.
- fixes contained for the following bugs:
  * CVE-2009-5031, CVE-2012-2751 [bnc#768293] request parameter handling
  * [bnc#768293] multi-part bypass, minor threat
  * CVE-2013-1915 [bnc#813190] XML external entity vulnerability
  * CVE-2012-4528 [bnc#789393] rule bypass
  * CVE-2013-2765 [bnc#822664] null pointer dereference crash
- new from 2.5.9 to 2.7.5, only major changes:
  * GPLv2 replaced by Apache License v2
  * rules are not part of the source tarball any longer, but
    maintaned upstream externally, and included in this package.
  * documentation was externalized to a wiki. Package contains
    the FAQ and the reference manual in html form.
  * renamed the term &amp;quot;Encryption&amp;quot; in directives that actually refer
    to hashes. See CHANGES file for more details.
  * new directive SecXmlExternalEntity, default off
  * byte conversion issues on s390x when logging fixed.
  * many small issues fixed that were discovered by a Coverity scanner
  * updated reference manual
  * wrong time calculation when logging for some timezones fixed.
  * replaced time-measuring mechanism with finer granularity for
    measured request/answer phases. (Stopwatch remains for compat.)
  * cookie parser memory leak fix
  * parsing of quoted strings in multipart Content-Disposition
    headers fixed.
  * SDBM deadlock fix
  * @rsub memory leak fix
  * cookie separator code improvements
  * build failure fixes
  * compile time option --enable-htaccess-config (set)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089984" comment="apache2-mod_security2-2.7.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:135" version="1" class="patch">
	<metadata>
		<title>update for mariadb, mysql-community-server</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This version upgrade of mariadb fixed the following issues:

- get rid of info which is not info (bnc#747811)
- minor polishing of spec/installation
- avoiding file conflicts with mytop
- better fix for hardcoded libdir issue
- making mysqldump work with MySQL 5.0 (bnc#768832)
- fixed log rights (bnc#789263 and bnc#803040)
- binlog disabled in default configuration (bnc#791863)
- fixed dependencies for client package (bnc#780019)

Additionally, it includes multiple security fixes.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009089987" comment="libmysqlclient-devel-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089988" comment="libmysqlclient18-32bit-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089989" comment="libmysqlclient18-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089992" comment="libmysqlclient_r18-32bit-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089993" comment="libmysqlclient_r18-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089994" comment="libmysqld-devel-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089995" comment="libmysqld18-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089997" comment="mariadb-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009089998" comment="mariadb-bench-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090000" comment="mariadb-client-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090002" comment="mariadb-debug-version-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090006" comment="mariadb-errormessages-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090007" comment="mariadb-test-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090009" comment="mariadb-tools-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090011" comment="libmysql55client18-32bit-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090012" comment="libmysql55client18-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090015" comment="libmysql55client_r18-32bit-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090016" comment="libmysql55client_r18-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090017" comment="mysql-community-server-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090018" comment="mysql-community-server-bench-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090020" comment="mysql-community-server-client-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090022" comment="mysql-community-server-debug-version-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090026" comment="mysql-community-server-errormessages-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090027" comment="mysql-community-server-test-5.5.32-1.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090029" comment="mysql-community-server-tools-5.5.32-1.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:136" version="1" class="patch">
	<metadata>
		<title>update for strongswan</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of strongswan fixed a denial-of-service vulnerability, that could be triggered by special XAuth usernames and EAP identities.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090031" comment="strongswan-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090033" comment="strongswan-doc-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090034" comment="strongswan-ipsec-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090036" comment="strongswan-libs0-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090038" comment="strongswan-mysql-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090040" comment="strongswan-nm-5.0.1-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090042" comment="strongswan-sqlite-5.0.1-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:137" version="1" class="patch">
	<metadata>
		<title>update for python-glanceclient</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of python-glanceclient fixed SSL certificate CNAME checking.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090044" comment="python-glanceclient-0.6.0.14.gc057fe4+git.1355912586.c057fe4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090045" comment="python-glanceclient-test-0.6.0.14.gc057fe4+git.1355912586.c057fe4-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:138" version="1" class="patch">
	<metadata>
		<title>update for samba</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of samba fixed the following issues:
  
- The pam_winbind require_membership_of option allows for a list of SID,
  but currently only provides buffer space for ~20; (bnc#806501).

- Samba 3.0.x to 4.0.7 are affected by a denial of service attack on
  authenticated or guest connections; CVE-2013-4124; (bnc#829969).

- PIDL: fix parsing linemarkers in preprocessor output; (bso#9636).
- build:autoconf: fix output of syslog-facility check; (bso#9983).
- libreplace: add a missing &amp;quot;eval&amp;quot; to the AC_VERIFY_C_PROTOTYPE macro.

- Remove ldapsmb from the main spec file.

- Don't bzip2 the main tar ball, use the upstream gziped one instead.

- Fix crash bug during Win8 sync; (bso#9822).
- Check for system libtevent and link dbwrap_tool and dbwrap_torture against
  it; (bso#9881).
- errno gets overwritten in call to check_parent_exists(); (bso#9927).
- Fix a bug of drvupgrade of smbcontrol; (bso#9941).

- Document idmap_ad rfc2307 attribute requirements; (bso#9880); (bnc#820531).

- Don't package the SWAT man page while its build is disabled; (bnc#816647).

- Don't install the tdb utilities man pages on post-12.1 systems; (bnc#823549).

- Fix libreplace license ambiguity; (bso#8997); (bnc#765270).

- s3-docs: Remove &amp;quot;experimental&amp;quot; label on &amp;quot;max protocol=SMB2&amp;quot; parameter;
  (bso#9688).
- Remove the compound_related_in_progress state from the smb2 global state;
  (bso#9722).
- Makefile: Don't know how to make LIBNDR_PREG_OBJ; (bso#9868).

- Fix is_printer_published GUID retrieval; (bso#9900); (bnc#798856).

- Fix 'map untrusted to domain' with NTLMv2; (bso#9817); (bnc#817919).
- Don't modify the pidfile name when a custom config file path is used;
  (bnc#812929).

- Add extra attributes for AD printer publishing; (bso#9378); (bnc#798856).
- Fix vfs_catia module; (bso#9701); (bnc#824833).
  systems; (bnc#804822); (bnc#821889).

- Fix AD printer publishing; (bso#9378); (bnc#798856).		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090121" comment="samba-doc-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090122" comment="libnetapi-devel-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090123" comment="libnetapi0-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090125" comment="libsmbclient-devel-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090126" comment="libsmbclient0-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090127" comment="libsmbclient0-32bit-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090130" comment="libsmbsharemodes-devel-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090131" comment="libsmbsharemodes0-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090133" comment="libwbclient-devel-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090134" comment="libwbclient0-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090135" comment="libwbclient0-32bit-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090138" comment="samba-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090139" comment="samba-32bit-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090140" comment="samba-client-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090141" comment="samba-client-32bit-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090147" comment="samba-devel-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090148" comment="samba-krb-printing-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090150" comment="samba-winbind-3.6.12-59.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090151" comment="samba-winbind-32bit-3.6.12-59.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:139" version="1" class="patch">
	<metadata>
		<title>libzypp: security fixes in RPM GPG key import parsing</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

libzypp was adjusted to enhance the RPM GPG key import/handling to
avoid a problem with multiple key blobs.

Attackers able to supplying a repository could let the packagemanager
show another keys fingerprint while a second one was actually used to
sign the repository (CVE-2013-3704).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090390" comment="libzypp-12.15.0-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090393" comment="libzypp-devel-12.15.0-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:140" version="1" class="patch">
	<metadata>
		<title>update for phpMyAdmin</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This version upgrade of phpMyAdmin fixed various security issues (SQL injection, XSS, full path disclosure, Clickjacking)		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090046" comment="phpMyAdmin-4.0.5-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:141" version="1" class="patch">
	<metadata>
		<title>update for MozillaFirefox, MozillaThunderbird, mozilla-nspr, mozilla-nss, seamonkey, xulrunner</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Changes in seamonkey:
- update to SeaMonkey 2.20 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702
    Miscellaneous memory safety hazards
  * MFSA 2013-64/CVE-2013-1704 (bmo#883313)
    Use after free mutating DOM during SetBody
  * MFSA 2013-65/CVE-2013-1705 (bmo#882865)
    Buffer underflow when generating CRMF requests
  * MFSA 2013-67/CVE-2013-1708 (bmo#879924)
    Crash during WAV audio file decoding
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-70/CVE-2013-1711 (bmo#843829)
    Bypass of XrayWrappers using XBL Scopes
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system
- requires NSPR 4.10 and NSS 3.15
- removed obsolete seamonkey-shared-nss-db.patch

Changes in seamonkey:
- update to SeaMonkey 2.20 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702
    Miscellaneous memory safety hazards
  * MFSA 2013-64/CVE-2013-1704 (bmo#883313)
    Use after free mutating DOM during SetBody
  * MFSA 2013-65/CVE-2013-1705 (bmo#882865)
    Buffer underflow when generating CRMF requests
  * MFSA 2013-67/CVE-2013-1708 (bmo#879924)
    Crash during WAV audio file decoding
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-70/CVE-2013-1711 (bmo#843829)
    Bypass of XrayWrappers using XBL Scopes
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system
- requires NSPR 4.10 and NSS 3.15
- removed obsolete seamonkey-shared-nss-db.patch

Changes in xulrunner:
- update to 17.0.8esr (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701
    Miscellaneous memory safety hazards
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system

Changes in xulrunner:
- update to 17.0.8esr (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701
    Miscellaneous memory safety hazards
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system

Changes in MozillaThunderbird:
- update to Thunderbird 17.0.8 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701
    Miscellaneous memory safety hazards
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system

- update Enigmail to 1.5.2
  * bugfix release

Changes in MozillaThunderbird:
- update to Thunderbird 17.0.8 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701
    Miscellaneous memory safety hazards
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system

- update Enigmail to 1.5.2
  * bugfix release

Changes in mozilla-nss:
- fix 32bit requirement, it's without () actually

- update to 3.15.1
  * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites
    (RFC 5246 and RFC 5289) are supported, allowing TLS to be used
    without MD5 and SHA-1.
    Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF,
      which is always SHA-256 in NSS 3.15.1.
      AES GCM cipher suites are not yet supported.
  * some bugfixes and improvements

- require libnssckbi instead of mozilla-nss-certs so p11-kit can
  conflict with the latter (fate#314991)

- update to 3.15
  * Packaging
    + removed obsolete patches
      * nss-disable-expired-testcerts.patch
      * bug-834091.patch
  * New Functionality
    + Support for OCSP Stapling (RFC 6066, Certificate Status
      Request) has been added for both client and server sockets.
      TLS client applications may enable this via a call to
      SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
    + Added function SECITEM_ReallocItemV2. It replaces function
      SECITEM_ReallocItem, which is now declared as obsolete.
    + Support for single-operation (eg: not multi-part) symmetric
      key encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
    + certutil has been updated to support creating name constraints
      extensions.
  * New Functions
    in ssl.h
      SSL_PeerStapledOCSPResponse - Returns the server's stapled
        OCSP response, when used with a TLS client socket that
        negotiated the status_request extension.
      SSL_SetStapledOCSPResponses - Set's a stapled OCSP response
        for a TLS server socket to return when clients send the
        status_request extension.
    in ocsp.h
      CERT_PostOCSPRequest - Primarily intended for testing, permits
        the sending and receiving of raw OCSP request/responses.
    in secpkcs7.h
      SEC_PKCS7VerifyDetachedSignatureAtTime - Verifies a PKCS#7
        signature at a specific time other than the present time.
    in xconst.h
      CERT_EncodeNameConstraintsExtension - Matching function for
        CERT_DecodeNameConstraintsExtension, added in NSS 3.10.
    in secitem.h
      SECITEM_AllocArray
      SECITEM_DupArray
      SECITEM_FreeArray
      SECITEM_ZfreeArray - Utility functions to handle the
        allocation and deallocation of SECItemArrays
      SECITEM_ReallocItemV2 - Replaces SECITEM_ReallocItem, which is
        now obsolete. SECITEM_ReallocItemV2 better matches caller
        expectations, in that it updates item-&amp;gt;len on allocation.
        For more details of the issues with SECITEM_ReallocItem,
        see Bug 298649 and Bug 298938.
    in pk11pub.h
      PK11_Decrypt - Performs decryption as a single PKCS#11
        operation (eg: not multi-part). This is necessary for AES-GCM.
      PK11_Encrypt - Performs encryption as a single PKCS#11
        operation (eg: not multi-part). This is necessary for AES-GCM.
  * New Types
    in secitem.h
      SECItemArray - Represents a variable-length array of SECItems.
  * New Macros
    in ssl.h
      SSL_ENABLE_OCSP_STAPLING - Used with SSL_OptionSet to configure
        TLS client sockets to request the certificate_status extension
        (eg: OCSP stapling) when set to PR_TRUE
  * Notable changes
    + SECITEM_ReallocItem is now deprecated. Please consider using
      SECITEM_ReallocItemV2 in all future code.
    + The list of root CA certificates in the nssckbi module has
      been updated.
    + The default implementation of SSL_AuthCertificate has been
      updated to add certificate status responses stapled by the TLS
      server to the OCSP cache.
  * a lot of bugfixes

- Add Source URL, see https://en.opensuse.org/SourceUrls

Changes in mozilla-nss:
- fix 32bit requirement, it's without () actually

- update to 3.15.1
  * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites
    (RFC 5246 and RFC 5289) are supported, allowing TLS to be used
    without MD5 and SHA-1.
    Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF,
      which is always SHA-256 in NSS 3.15.1.
      AES GCM cipher suites are not yet supported.
  * some bugfixes and improvements

- require libnssckbi instead of mozilla-nss-certs so p11-kit can
  conflict with the latter (fate#314991)

- update to 3.15
  * Packaging
    + removed obsolete patches
      * nss-disable-expired-testcerts.patch
      * bug-834091.patch
  * New Functionality
    + Support for OCSP Stapling (RFC 6066, Certificate Status
      Request) has been added for both client and server sockets.
      TLS client applications may enable this via a call to
      SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
    + Added function SECITEM_ReallocItemV2. It replaces function
      SECITEM_ReallocItem, which is now declared as obsolete.
    + Support for single-operation (eg: not multi-part) symmetric
      key encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
    + certutil has been updated to support creating name constraints
      extensions.
  * New Functions
    in ssl.h
      SSL_PeerStapledOCSPResponse - Returns the server's stapled
        OCSP response, when used with a TLS client socket that
        negotiated the status_request extension.
      SSL_SetStapledOCSPResponses - Set's a stapled OCSP response
        for a TLS server socket to return when clients send the
        status_request extension.
    in ocsp.h
      CERT_PostOCSPRequest - Primarily intended for testing, permits
        the sending and receiving of raw OCSP request/responses.
    in secpkcs7.h
      SEC_PKCS7VerifyDetachedSignatureAtTime - Verifies a PKCS#7
        signature at a specific time other than the present time.
    in xconst.h
      CERT_EncodeNameConstraintsExtension - Matching function for
        CERT_DecodeNameConstraintsExtension, added in NSS 3.10.
    in secitem.h
      SECITEM_AllocArray
      SECITEM_DupArray
      SECITEM_FreeArray
      SECITEM_ZfreeArray - Utility functions to handle the
        allocation and deallocation of SECItemArrays
      SECITEM_ReallocItemV2 - Replaces SECITEM_ReallocItem, which is
        now obsolete. SECITEM_ReallocItemV2 better matches caller
        expectations, in that it updates item-&amp;gt;len on allocation.
        For more details of the issues with SECITEM_ReallocItem,
        see Bug 298649 and Bug 298938.
    in pk11pub.h
      PK11_Decrypt - Performs decryption as a single PKCS#11
        operation (eg: not multi-part). This is necessary for AES-GCM.
      PK11_Encrypt - Performs encryption as a single PKCS#11
        operation (eg: not multi-part). This is necessary for AES-GCM.
  * New Types
    in secitem.h
      SECItemArray - Represents a variable-length array of SECItems.
  * New Macros
    in ssl.h
      SSL_ENABLE_OCSP_STAPLING - Used with SSL_OptionSet to configure
        TLS client sockets to request the certificate_status extension
        (eg: OCSP stapling) when set to PR_TRUE
  * Notable changes
    + SECITEM_ReallocItem is now deprecated. Please consider using
      SECITEM_ReallocItemV2 in all future code.
    + The list of root CA certificates in the nssckbi module has
      been updated.
    + The default implementation of SSL_AuthCertificate has been
      updated to add certificate status responses stapled by the TLS
      server to the OCSP cache.
  * a lot of bugfixes

- Add Source URL, see https://en.opensuse.org/SourceUrls

Changes in mozilla-nspr:
- update to version 4.10
  * bmo#844513: Add AddressSanitizer (ASan) memory check annotations to
    PLArena.
  * bmo#849089: Simple changes to make NSPR's configure.in work with
    the current version of autoconf.
  * bmo#856196: Fix compiler warnings and clean up code in NSPR 4.10.
  * bmo#859066: Fix warning in nsprpub/pr/src/misc/prnetdb.c.
  * bmo#859830: Deprecate ANDROID_VERSION in favor of android/api-level.h.
  * bmo#861434: Make PR_SetThreadPriority() change priorities
    relatively to the main process instead of using absolute values on
    Linux.
  * bmo#871064L: _PR_InitThreads() should not call PR_SetThreadPriority.

Changes in mozilla-nspr:
- update to version 4.10
  * bmo#844513: Add AddressSanitizer (ASan) memory check annotations to
    PLArena.
  * bmo#849089: Simple changes to make NSPR's configure.in work with
    the current version of autoconf.
  * bmo#856196: Fix compiler warnings and clean up code in NSPR 4.10.
  * bmo#859066: Fix warning in nsprpub/pr/src/misc/prnetdb.c.
  * bmo#859830: Deprecate ANDROID_VERSION in favor of android/api-level.h.
  * bmo#861434: Make PR_SetThreadPriority() change priorities
    relatively to the main process instead of using absolute values on
    Linux.
  * bmo#871064L: _PR_InitThreads() should not call PR_SetThreadPriority.

Changes in MozillaFirefox:
- update to Firefox 23.0 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702
    Miscellaneous memory safety hazards
  * MFSA 2013-64/CVE-2013-1704 (bmo#883313)
    Use after free mutating DOM during SetBody
  * MFSA 2013-65/CVE-2013-1705 (bmo#882865)
    Buffer underflow when generating CRMF requests
  * MFSA 2013-67/CVE-2013-1708 (bmo#879924)
    Crash during WAV audio file decoding
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-70/CVE-2013-1711 (bmo#843829)
    Bypass of XrayWrappers using XBL Scopes
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system
- requires NSPR 4.10 and NSS 3.15

- fix build on ARM (/-g/ matches /-grecord-switches/)

Changes in MozillaFirefox:
- update to Firefox 23.0 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702
    Miscellaneous memory safety hazards
  * MFSA 2013-64/CVE-2013-1704 (bmo#883313)
    Use after free mutating DOM during SetBody
  * MFSA 2013-65/CVE-2013-1705 (bmo#882865)
    Buffer underflow when generating CRMF requests
  * MFSA 2013-67/CVE-2013-1708 (bmo#879924)
    Crash during WAV audio file decoding
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-70/CVE-2013-1711 (bmo#843829)
    Bypass of XrayWrappers using XBL Scopes
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system
- requires NSPR 4.10 and NSS 3.15

- fix build on ARM (/-g/ matches /-grecord-switches/)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:142" version="1" class="patch">
	<metadata>
		<title>bind: 9.9.3P2 security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The BIND nameserver was updated to 9.9.3P2 to fix a security issue
where incorrect bounds checking on private type 'keydata' could lead
to a remotely triggerable REQUIRE failure. (CVE-2013-4854, bnc#831899)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090245" comment="bind-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090246" comment="bind-chrootenv-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090249" comment="bind-devel-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090250" comment="bind-doc-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090251" comment="bind-libs-32bit-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090252" comment="bind-libs-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090255" comment="bind-lwresd-9.9.3P2-2.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090257" comment="bind-utils-9.9.3P2-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:143" version="1" class="patch">
	<metadata>
		<title>filezilla: 3.7.3 version and security bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

FileZilla was updated to version 3.7.3 to add various features, fix
bugs and also security issues in the embedded putty ssh client.

Full changelog: https://filezilla-project.org/changelog.php
  - Noteworthy changes:
    * Apply a fix for a security vulnerability in PuTTY as used in FileZilla to handle SFTP. See CVE-2013-4852 for reference.
    * Merge further fixes from PuTTY to address CVE-2013-4206, CVE-2013-4207, CVE-2013-4208

- Version bump to 3.7.0.1
  - Fix issues with bundled gnutls
  - Update translations

- Update to version 3.7.0. Changes since 3.6.0.2:
  - Show total transfer speed as tooltip over the transfer indicators
  - List supported protocols in tooltip of host field in quickconnect bar
  - Use TLS instead of the deprecated term SSL
  - Reworded text when saving of passwords is disabled, do not refer to kiosk mode
  - Improved usability of Update page in settings dialog
  - Improve SFTP performance
  - When navigating to the parent directory, highlight the former child
  - When editing files, use high priority for the transfers
  - Add label to size conditions in filter conditions dialog indicating that the unit is bytes
  - Ignore drag&amp;amp;drop operations where source and target are identical and clarify the wording in some drop error cases
  - Trim whitespace from the entered port numbers
  - Slightly darker color of inactive tabs
  - Ignore .. item in the file list context menus if multiple items are selected
  - Display TLS version and key exchange algorithm in certificate and encryption details dialog for FTP over TLS connections.
  - Fix handling of remote paths containing double-quotes
  - Fix crash when opening local directories in Explorer if the name contained characters not representable in the locale's narrow-width character set.
  - Fix a memory leak in the host key verification dialog for SFTP
  - Fix drag-scrolling in file lists with very low height
  - Don't attempt writing XML files upon loading them
  - Improve handling of legacy DDE file associations
  - Fix handling of HTTPS in the auto updater in case a mirror redirects to HTTPS

- Update to version 3.6.0.2. Changes since 3.5.3:
  - 3.6.0.2 (2012-11-29)
    * Fix problems with stalling FTP over TLS uploads
    * MSW: Minor performance increase listing local files
  - 3.6.0.1 (2012-11-18)
    * Fix problems with TLS cipher selection, including a bugfix
      for GnuTLS
    * Fix a crash on shutdown
    * Add log message for servers not using UTF-8
    * Small performance and memory optimizations getting file
      types
    * Improve formatting of transfer speeds
  - 3.6.0 (2012-11-10)
    * Fix a crash introduced since 3.5.3
    * IPv6-only hosts should no longer cause a crash in the
      network configuration wizard
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090222" comment="filezilla-3.7.3-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090225" comment="filezilla-lang-3.7.3-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:144" version="1" class="patch">
	<metadata>
		<title>update for putty</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Putty was updated to 0.63, bringing features, bug and 
security fixes.

Changes:
- Add 0001-Revert-the-default-for-font-bolding-style.patch
  (upstream patch fixing a cosmetic change introduced in 0.63)
- Add Conflict tag against pssh package (Parallel SSH) due to
  conflicting files in /usr/bin

- Do signature verification

- update to 0.63
  * Security fix: prevent a nefarious SSH server or network attacker
    from crashing PuTTY at startup in three different ways by 
    presenting a maliciously constructed public key and signature.
    [bnc#833567] CVE-2013-4852
  * Security fix: PuTTY no longer retains the private half of users' 
    keys in memory by mistake after authenticating with them.
  * Revamped the internal configuration storage system to remove all 
    fixed arbitrary limits on string lengths. In particular, there 
    should now no longer be an unreasonably small limit on the number 
    of port forwardings PuTTY can store.
  * Forwarded TCP connections which close one direction before the
    other should now be reliably supported, with EOF propagated 
    independently in the two directions. This also fixes some instances 
    of forwarding data corruption (if the corruption consisted of
    losing data from the very end of the connection) and some instances
    of PuTTY failing to close when the session is over (because it 
    wrongly thought a forwarding channel was still active when it was 
    not).
  * The terminal emulation now supports xterm's bracketed paste mode 
    (allowing aware applications to tell the difference between typed
    and pasted text, so that e.g. editors need not apply inappropriate
    auto-indent).
  * You can now choose to display bold text by both brightening the 
    foreground colour and changing the font, not just one or the other.
  * PuTTYgen will now never generate a 2047-bit key when asked for 2048 
    (or more generally n−1 bits when asked for n).
  * Some updates to default settings: PuTTYgen now generates 2048-bit 
    keys by default (rather than 1024), and PuTTY defaults to UTF-8 
    encoding and 2000 lines of scrollback (rather than ISO 8859-1 and
    200).
  * Unix: PSCP and PSFTP now preserve the Unix file permissions, on 
    copies in both directions.
  * Unix: dead keys and compose-character sequences are now supported.
  * Unix: PuTTY and pterm now permit font fallback (where glyphs not 
    present in your selected font are automatically filled in from other 
    fonts on the system) even if you are using a server-side X11 font 
    rather than a Pango client-side one.
  * Bug fixes too numerous to list, mostly resulting from running the 
    code through Coverity Scan which spotted an assortment of memory
    and resource leaks, logic errors, and crashes in various circumstances. 
- packaging changes:
  * run make from base directory
  * run tests
  * remove putty-01-werror.diff (currently not needed)
  * remove putty-02-remove-gtk1.diff, putty-05-glib-deprecated.diff,
    putty-06-gtk2-indivhdr.diff (no longer needed)
  * refresh putty-03-config.diff
  * remove autoconf calls and requirements
  * package HTML documentation
  * package LICENCE file
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090259" comment="putty-0.63-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:145" version="1" class="patch">
	<metadata>
		<title>puppet: security fix for YAML support</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

A potential remote code execution via YAML was fixed in puppet. (CVE-2013-3567)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090291" comment="puppet-3.0.2-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090292" comment="puppet-server-3.0.2-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:146" version="1" class="patch">
	<metadata>
		<title>cacti: security and bugfix update to 0.8.8b</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

cacti was updated to version 0.8.8b to fix security issues and bugs.
- Fixes CVE-2013-1434 CVE-2013-1435
- security: SQL injection and shell escaping issues 
- bug: Fixed issue with custom data source information being lost when saved from edit
- bug: Repopulate the poller cache on new installations
- bug: Fix issue with poller not escaping the script query path correctly
- bug: Allow snmpv3 priv proto none
- bug: Fix issue where host activate may flush the entire poller item cache
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090306" comment="cacti-0.8.8b-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:147" version="1" class="patch">
	<metadata>
		<title>ruby: configure https usage for rubygems.org </title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
The ruby gemrc configured the gem installation source as http
source, allowing man in the middle attacks (if someone could provide a different
address for rubygems.org).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090351" comment="ruby-1.9.3-15.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090352" comment="ruby-devel-1.9.3-15.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:148" version="1" class="patch">
	<metadata>
		<title>xen: security and bugfix update to 4.2.2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

XEN was updated to 4.2.2, fixing lots of bugs and several security issues.

Various upstream patches were also merged into this version by our 
developers.

Detailed buglist:
- bnc#824676 - Failed to setup devices for vm instance when
  start multiple vms simultaneously

- bnc#817799 - sles9sp4 guest fails to start after upgrading to
  sles11 sp3

- bnc#826882 - xen: CVE-2013-1432: XSA-58: Page reference
  counting error due to XSA-45/CVE-2013-1918 fixes

- Add upstream patch to fix devid assignment in libxl
  27184-libxl-devid-fix.patch

- bnc#823608 - xen: XSA-57: libxl allows guest write access to
  sensitive console related xenstore keys
  27178-libxl-Restrict-permissions-on-PV-console-device-xenstore-nodes.patch
- bnc#823011 - xen: XSA-55: Multiple vulnerabilities in
  libelf PV kernel handling

- bnc#808269 - Fully Virtualized Windows VM install is failed on
  Ivy Bridge platforms with Xen kernel

- bnc#801663 - performance of mirror lvm unsuitable for production
  block-dmmd

- bnc#817904 - [SLES11SP3 BCS Bug] Crashkernel fails to boot after
  panic on XEN kernel SP3 Beta 4 and RC1

- Upstream AMD Erratum patch from Jan

- bnc#813675 - - xen: CVE-2013-1919: XSA-46: Several access
  permission issues with IRQs for unprivileged guests

- bnc#820917 - CVE-2013-2076: xen: Information leak on
  XSAVE/XRSTOR capable AMD CPUs (XSA-52)
- bnc#820919 - CVE-2013-2077: xen: Hypervisor crash due to
  missing exception recovery on XRSTOR (XSA-53)
- bnc#820920 - CVE-2013-2078: xen: Hypervisor crash due to
  missing exception recovery on XSETBV (XSA-54)
- bnc#808085 - aacraid driver panics mapping INT A when booting
  kernel-xen
- bnc#817210 - openSUSE 12.3 Domain 0 doesn't boot with i915
  graphics controller under Xen with VT-d enabled

- bnc#819416 - xen: CVE-2013-2072: XSA-56: Buffer overflow
  in xencontrol Python bindings affecting xend

- bnc#818183 - xen: CVE-2013-2007: XSA-51: qga set umask 0077 when daemonizing

- add lndir to BuildRequires

- remove xen.migrate.tools_notify_restore_to_hangup_during_migration_--abort_if_busy.patch
  It changed migration protocol and upstream wants a different solution

- bnc#802221 - fix xenpaging
  readd xenpaging.qemu.flush-cache.patch

- bnc#808269 - Fully Virtualized Windows VM install is failed on
  Ivy Bridge platforms with Xen kernel

- Additional fix for bnc#816159
  CVE-2013-1918-xsa45-followup.patch

- bnc#817068 - Xen guest with &amp;gt;1 sr-iov vf won't start

- Update to Xen 4.2.2 c/s 26064
  The following recent security patches are included in the tarball
  CVE-2013-0151-xsa34.patch (bnc#797285)
  CVE-2012-6075-xsa41.patch (bnc#797523)
  CVE-2013-1917-xsa44.patch (bnc#813673)
  CVE-2013-1919-xsa46.patch (bnc#813675)

- bnc#816159 - xen: CVE-2013-1918: XSA-45: Several long
  latency operations are not preemptible

- bnc#816163 - xen: CVE-2013-1952: XSA-49: VT-d interrupt
  remapping source validation flaw for bridges

- bnc#809662 - can't use pv-grub to start domU (pygrub does work)
  xen.spec

- bnc#814709 - Unable to create XEN virtual machines in SLED 11 SP2
  on Kyoto

- bnc#813673 - CVE-2013-1917: xen: Xen PV DoS vulnerability with
  SYSENTER
- bnc#813675 - CVE-2013-1919: xen: Several access permission
  issues with IRQs for unprivileged guests
- bnc#814059 - xen: qemu-nbd format-guessing due to missing
  format specification
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090353" comment="xen-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090355" comment="xen-devel-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090356" comment="xen-kmp-default-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090358" comment="xen-kmp-desktop-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090360" comment="xen-kmp-pae-4.2.2_06_k3.7.10_1.16-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090362" comment="xen-libs-32bit-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090363" comment="xen-libs-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090366" comment="xen-tools-domU-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090368" comment="xen-doc-html-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090369" comment="xen-doc-pdf-4.2.2_06-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090370" comment="xen-tools-4.2.2_06-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:149" version="1" class="patch">
	<metadata>
		<title>roundcubemail: version update to 0.9.3</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

roundcubemail was updated to version 0.9.3 (bnc#837436) (CVE-2013-5645)
* Optimized UI behavior for touch devices
* Fix setting refresh_interval to &amp;quot;Never&amp;quot; in Preferences
* Fix purge action in folder manager
* Fix base URL resolving on attribute values with no quotes
* Fix wrong handling of links with '|' character
* Fix colorspace issue on image conversion using ImageMagick?
* Fix XSS vulnerability when saving HTML signatures
* Fix XSS vulnerability when editing a message &amp;quot;as new&amp;quot; or draft
* Fix rewrite rule in .htaccess
* Fix detecting Turkish language in ISO-8859-9 encoding
* Fix identity-selection using Return-Path headers
* Fix parsing of links with ... in URL
* Fix compose priority selector when opening in new window
* Fix bug where signature wasn't changed on identity selection when editing a draft
* Fix IMAP SETMETADATA parameters quoting
* Fix &amp;quot;could not load message&amp;quot; error on valid empty message body
* Fix handling of message/rfc822 attachments on message forward and edit
* Fix parsing of square bracket characters in IMAP response strings
* Don't clear References and in-Reply-To when a message is &amp;quot;edited as new&amp;quot;
* Fix messages list sorting with THREAD=REFS
* Remove deprecated (in PHP 5.5) PREG /e modifier usage
* Fix empty messages list when register_globals is enabled
* Fix so valid and set date.timezone is not required by installer checks
* Canonize boolean ini_get() results
* Fix so install do not fail when one of DB driver checks fails but other drivers exist
* Fix so exported vCard specifies encoding in v3-compatible format
- Update to version 0.9.2
* Fix image thumbnails display in print mode
* Fix height of message headers block
* Fix timeout issue on drag&amp;amp;drop uploads
* Fix default sorting of threaded list when THREAD=REFS isn't supported
* Fix list mode switch to 'List' after saving list settings in Larry skin
* Fix error when there's no writeable addressbook source
* Fix zipdownload plugin issue with filenames charset
* Fix so non-inline images aren't skipped on forward
* Fix &amp;quot;null&amp;quot; instead of empty string on messages list in IE10
* Fix legacy options handling
* Fix so bounces addresses in Sender headers are skipped on Reply-All
* Fix bug where serialized strings were truncated in PDO::quote()
* Fix displaying messages with invalid self-closing HTML tags
* Fix PHP warning when responding to a message with many Return-Path headers
* Fix unintentional compose window resize
* Fix performance regression in text wrapping function
* Fix connection to posgtres db using unix socket
* Fix handling of comma when adding contact from contacts widget
* Fix bug where a message was opened in both preview pane and new window on double-click
* Fix fatal error when xdebug.max_nesting_level was exceeded in rcube_washtml
* Fix PHP warning in html_table::set_row_attribs() in PHP 5.4
* Fix invalid option selected in default_font selector when font is unset
* Fix displaying contact with ID divisible by 100 in sql addressbook
* Fix browser warnings on PDF plugin detection
* Fix fatal error when parsing UUencoded messages

- Update to version 0.9.1
* a lot of bugfixes and smaller improvements
(http://trac.roundcube.net/wiki/Changelog)

- Update to version 0.9.0
* Improved rendering of forwarded and attached messages
* Optionally display and compose email messages a new windows
* Unified UI for message view and composition
* Show sender photos from contacts in email view
* Render thumbnails for image attachments
* Download all attachments as zip archive (using the zipdownload plugin)
* Forward multiple emails as attachments
* CSV import for contacts
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090385" comment="roundcubemail-0.9.3-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:150" version="1" class="patch">
	<metadata>
		<title>update for python</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This python update includes a SSL certificates fix.

- handle NULL bytes in certain fields of SSL certificates
  (CVE-2013-4238, bnc#834601, CVE-2013-4238_py27.patch)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090472" comment="libpython2_7-1_0-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090473" comment="libpython2_7-1_0-32bit-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090476" comment="python-base-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090477" comment="python-base-32bit-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090481" comment="python-devel-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090482" comment="python-xml-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090484" comment="python-doc-2.7-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090485" comment="python-doc-pdf-2.7-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090486" comment="python-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090487" comment="python-32bit-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090488" comment="python-curses-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090493" comment="python-demo-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090494" comment="python-gdbm-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090496" comment="python-idle-2.7.3-10.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090497" comment="python-tk-2.7.3-10.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:151" version="1" class="patch">
	<metadata>
		<title>update for python3</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This python update includes a SSL certificates fix.
 
- handle NULL bytes in certain fields of SSL certificates
  (CVE-2013-4238, bnc#834601, CVE-2013-4238_py33.patch)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090499" comment="libpython3_3m1_0-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090500" comment="libpython3_3m1_0-32bit-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090503" comment="python3-base-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090504" comment="python3-base-32bit-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090508" comment="python3-devel-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090510" comment="python3-idle-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090511" comment="python3-testsuite-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090513" comment="python3-tools-3.3.0-6.11.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090514" comment="python3-doc-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090515" comment="python3-doc-pdf-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090516" comment="python3-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090517" comment="python3-32bit-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090518" comment="python3-curses-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090520" comment="python3-dbm-3.3.0-6.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090525" comment="python3-tk-3.3.0-6.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:152" version="1" class="patch">
	<metadata>
		<title>update for squid</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This squid update includes several security fixes and
minor changes.

- squid-3.2.x-11823-bnc829084-CVE-2013-4115.diff fixes a buffer
  overflow involving very long hostnames. [bnc#829084] CVE-2013-4115
- squid-3.2.x-11823-bnc830319-CVE-2013-4123.diff fixes problems
  identifying a port number as specified by the client. 
  [bnc#830319] CVE-2013-4123
- run logrotate as squid:nogroup [bnc#677335]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090527" comment="squid-3.2.11-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:153" version="1" class="patch">
	<metadata>
		<title>update for subversion</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This subversion update includes a security fix and several
minor changes.

- update to 1.7.13 [bnc#836245]
- User-visible changes:
  - General
    * merge: fix bogus mergeinfo with conflicting file merges
    * diff: fix duplicated path component in '--summarize' output
    * ra_serf: ignore case when checking certificate common names
  - Server-side bugfixes:
    * svnserve: fix creation of pid files  CVE-2013-4277
    * mod_dav_svn: better status codes for commit failures
    * mod_dav_svn: do not map requests to filesystem
- Developer-visible changes:
  - General:
    * don't use uninitialized variable to produce an error code
  - Bindings:
    * swig-pl: fix SVN::Client not honoring config file settings
    * swig-pl &amp;amp; swig-py: disable unusable svn_fs_set_warning_func
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090530" comment="libsvn_auth_gnome_keyring-1-0-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090532" comment="libsvn_auth_kwallet-1-0-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090534" comment="subversion-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090535" comment="subversion-bash-completion-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090538" comment="subversion-devel-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090539" comment="subversion-perl-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090541" comment="subversion-python-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090543" comment="subversion-server-1.7.13-2.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090545" comment="subversion-tools-1.7.13-2.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:154" version="1" class="patch">
	<metadata>
		<title>update for wireshark</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This wireshark update to 1.8.10 fixes several security and
non security bugs. [bnc#839607]

  + vulnerabilities fixed:
    * The NBAP dissector could crash.
      wnpa-sec-2013-55 CVE-2013-5718
    * The ASSA R3 dissector could go into an infinite loop.
      wnpa-sec-2013-56 CVE-2013-5719
    * The RTPS dissector could overflow a buffer.
      wnpa-sec-2013-57 CVE-2013-5720
    * The MQ dissector could crash.
      wnpa-sec-2013-58 CVE-2013-5721
    * The LDAP dissector could crash.
      wnpa-sec-2013-59 CVE-2013-5722
    * The Netmon file parser could crash.
      wnpa-sec-2013-60

  + Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.8.10.html
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090703" comment="wireshark-1.8.10-1.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090706" comment="wireshark-devel-1.8.10-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:155" version="1" class="patch">
	<metadata>
		<title>update for tiff</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This tiff security update fixes several buffer overflow issues
and a out-of-bounds wirte problem.

  * tiff: buffer overflows/use after free problem [CVE-2013-4231][CVE-2013-4232][bnc#834477]
  * libtiff (gif2tiff): OOB Write in LZW decompressor [CVE-2013-4244][bnc#834788]
  * libtiff (gif2tiff): heap-based buffer overflow in readgifimage() [CVE-2013-4243][bnc#834779]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090707" comment="libtiff-devel-32bit-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090708" comment="libtiff-devel-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090709" comment="libtiff5-32bit-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090710" comment="libtiff5-4.0.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090713" comment="tiff-4.0.3-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:156" version="1" class="patch">
	<metadata>
		<title></title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Empty.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090760" comment="gpg2-2.0.19-5.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090763" comment="gpg2-lang-2.0.19-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:157" version="1" class="patch">
	<metadata>
		<title>update for xulrunner17</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This xulrunner17 version update to 17.0.9esr fixes the following 
security issues (bnc#840485):

  * MFSA 2013-65/CVE-2013-1705 (bmo#882865)
    Buffer underflow when generating CRMF requests
  * MFSA 2013-76/CVE-2013-1718
    Miscellaneous memory safety hazards
  * MFSA 2013-79/CVE-2013-1722 (bmo#893308)
    Use-after-free in Animation Manager during stylesheet cloning
  * MFSA 2013-82/CVE-2013-1725 (bmo#876762)
    Calling scope for new Javascript objects can lead to memory corruption
  * MFSA 2013-88/CVE-2013-1730 (bmo#851353)
    Compartment mismatch re-attaching XBL-backed nodes
  * MFSA 2013-89/CVE-2013-1732 (bmo#883514)
    Buffer overflow with multi-column, lists, and floats
  * MFSA 2013-90/CVE-2013-1735/CVE-2013-1736 (bmo#898871, bmo#906301)
    Memory corruption involving scrolling
  * MFSA 2013-91/CVE-2013-1737 (bmo#907727)
    User-defined properties on DOM proxies get the wrong &amp;quot;this&amp;quot; object
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090723" comment="mozilla-js-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090724" comment="mozilla-js-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090727" comment="xulrunner-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090728" comment="xulrunner-32bit-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090729" comment="xulrunner-buildsymbols-17.0.9-2.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090733" comment="xulrunner-devel-17.0.9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:158" version="1" class="patch">
	<metadata>
		<title>update for MozillaFirefox</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This MozillaFirefox update to version 24.0 fixes several 
security and non-security issues:

- move greek to the translations-common package (bnc#840551)

- update to Firefox 24.0 (bnc#840485)
  * MFSA 2013-76/CVE-2013-1718/CVE-2013-1719
    Miscellaneous memory safety hazards
  * MFSA 2013-77/CVE-2013-1720 (bmo#888820)
    Improper state in HTML5 Tree Builder with templates
  * MFSA 2013-78/CVE-2013-1721 (bmo#890277)
    Integer overflow in ANGLE library
  * MFSA 2013-79/CVE-2013-1722 (bmo#893308)
    Use-after-free in Animation Manager during stylesheet cloning
  * MFSA 2013-80/CVE-2013-1723 (bmo#891292)
    NativeKey continues handling key messages after widget is destroyed
  * MFSA 2013-81/CVE-2013-1724 (bmo#894137)
    Use-after-free with select element
  * MFSA 2013-82/CVE-2013-1725 (bmo#876762)
    Calling scope for new Javascript objects can lead to memory corruption
  * MFSA 2013-85/CVE-2013-1728 (bmo#883686)
    Uninitialized data in IonMonkey
  * MFSA 2013-88/CVE-2013-1730 (bmo#851353)
    Compartment mismatch re-attaching XBL-backed nodes
  * MFSA 2013-89/CVE-2013-1732 (bmo#883514)
    Buffer overflow with multi-column, lists, and floats
  * MFSA 2013-90/CVE-2013-1735/CVE-2013-1736 (bmo#898871, bmo#906301)
    Memory corruption involving scrolling
  * MFSA 2013-91/CVE-2013-1737 (bmo#907727)
    User-defined properties on DOM proxies get the wrong &amp;quot;this&amp;quot; object
  * MFSA 2013-92/CVE-2013-1738 (bmo#887334, bmo#882897)
    GC hazard with default compartments and frame chain restoration
- enable gstreamer explicitely via pref (gecko.js)
- require NSS 3.15.1
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090764" comment="MozillaFirefox-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090765" comment="MozillaFirefox-branding-upstream-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090766" comment="MozillaFirefox-buildsymbols-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090769" comment="MozillaFirefox-devel-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090770" comment="MozillaFirefox-translations-common-24.0-1.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090771" comment="MozillaFirefox-translations-other-24.0-1.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:159" version="1" class="patch">
	<metadata>
		<title>update for MozillaThunderbird</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This MozillaThunderbird update to version 24.0 fixes several
security and non-security issues:

- update to Thunderbird 24.0 (bnc#840485)
  * MFSA 2013-76/CVE-2013-1718/CVE-2013-1719
    Miscellaneous memory safety hazards
  * MFSA 2013-77/CVE-2013-1720 (bmo#888820)
    Improper state in HTML5 Tree Builder with templates
  * MFSA 2013-79/CVE-2013-1722 (bmo#893308)
    Use-after-free in Animation Manager during stylesheet cloning
  * MFSA 2013-80/CVE-2013-1723 (bmo#891292)
    NativeKey continues handling key messages after widget is destroyed
  * MFSA 2013-81/CVE-2013-1724 (bmo#894137)
    Use-after-free with select element
  * MFSA 2013-82/CVE-2013-1725 (bmo#876762)
    Calling scope for new Javascript objects can lead to memory corruption
  * MFSA 2013-85/CVE-2013-1728 (bmo#883686)
    Uninitialized data in IonMonkey
  * MFSA 2013-88/CVE-2013-1730 (bmo#851353)
    Compartment mismatch re-attaching XBL-backed nodes
  * MFSA 2013-89/CVE-2013-1732 (bmo#883514)
    Buffer overflow with multi-column, lists, and floats
  * MFSA 2013-90/CVE-2013-1735/CVE-2013-1736 (bmo#898871, bmo#906301)
    Memory corruption involving scrolling
  * MFSA 2013-91/CVE-2013-1737 (bmo#907727)
    User-defined properties on DOM proxies get the wrong &amp;quot;this&amp;quot; object
  * MFSA 2013-92/CVE-2013-1738 (bmo#887334, bmo#882897)
    GC hazard with default compartments and frame chain restoration
- moved greek to common translation package
- require NSPR 4.10 and NSS 3.15.1
- add GStreamer build requirements for Gecko
- added enigmail-build.patch to fix TB packaging (bmo#886095)
- removed obsolete patches:
  * enigmail-old-gcc.patch
  * mozilla-gcc43-enums.patch
  * mozilla-gcc43-template_hacks.patch
  * mozilla-gcc43-templates_instantiation.patch
  * ppc-xpcshell.patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090772" comment="MozillaThunderbird-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090773" comment="MozillaThunderbird-buildsymbols-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090776" comment="MozillaThunderbird-devel-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090777" comment="MozillaThunderbird-translations-common-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090778" comment="MozillaThunderbird-translations-other-24.0-61.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090779" comment="enigmail-1.5.2+24.0-61.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:160" version="1" class="patch">
	<metadata>
		<title>update for seamonkey</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This seamonkey update to version 2.21 fixes several security and
non-security issues:

- update to SeaMonkey 2.21 (bnc#840485)
  * MFSA 2013-76/CVE-2013-1718/CVE-2013-1719
    Miscellaneous memory safety hazards
  * MFSA 2013-77/CVE-2013-1720 (bmo#888820)
    Improper state in HTML5 Tree Builder with templates
  * MFSA 2013-78/CVE-2013-1721 (bmo#890277)
    Integer overflow in ANGLE library
  * MFSA 2013-79/CVE-2013-1722 (bmo#893308)
    Use-after-free in Animation Manager during stylesheet cloning
  * MFSA 2013-80/CVE-2013-1723 (bmo#891292)
    NativeKey continues handling key messages after widget is destroyed
  * MFSA 2013-81/CVE-2013-1724 (bmo#894137)
    Use-after-free with select element
  * MFSA 2013-82/CVE-2013-1725 (bmo#876762)
    Calling scope for new Javascript objects can lead to memory corruption
  * MFSA 2013-85/CVE-2013-1728 (bmo#883686)
    Uninitialized data in IonMonkey
  * MFSA 2013-88/CVE-2013-1730 (bmo#851353)
    Compartment mismatch re-attaching XBL-backed nodes
  * MFSA 2013-89/CVE-2013-1732 (bmo#883514)
    Buffer overflow with multi-column, lists, and floats
  * MFSA 2013-90/CVE-2013-1735/CVE-2013-1736 (bmo#898871, bmo#906301)
    Memory corruption involving scrolling
  * MFSA 2013-91/CVE-2013-1737 (bmo#907727)
    User-defined properties on DOM proxies get the wrong &amp;quot;this&amp;quot; object
  * MFSA 2013-92/CVE-2013-1738 (bmo#887334, bmo#882897)
    GC hazard with default compartments and frame chain restoration
- requires NSS 3.15.1
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090781" comment="seamonkey-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090784" comment="seamonkey-dom-inspector-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090785" comment="seamonkey-irc-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090786" comment="seamonkey-translations-common-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090787" comment="seamonkey-translations-other-2.21-1.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090788" comment="seamonkey-venkman-2.21-1.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:161" version="1" class="patch">
	<metadata>
		<title>update for python-django</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This python-django update fixes several security issues.

- Update to version 1.4.8 (bnc#840832, CVE-2013-1443):
  + Fixed denial-of-service via large passwords
- Changes from version 1.4.7:
  + Fixed directory traversal with ssi template tag
- Changes from version 1.4.6:
  + Fixed Cross-site scripting (XSS) in admin interface
  + Fixed Possible XSS via is_safe_url
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090759" comment="python-django-1.4.8-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:162" version="1" class="patch">
	<metadata>
		<title>update for boost</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This boost update fixes a UTF validation problem.

- Apply boost-locale_utf.patch to fix a vulnerability in the utf
  handling of boost:locale (bnc#801991, CVE-2013-0252)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090880" comment="boost-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090881" comment="boost-devel-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090882" comment="boost-devel-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090883" comment="boost-doc-html-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090884" comment="boost-doc-man-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090885" comment="boost-doc-pdf-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090886" comment="boost-license1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090887" comment="libboost_chrono1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090888" comment="libboost_date_time1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090889" comment="libboost_date_time1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090890" comment="libboost_filesystem1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090891" comment="libboost_filesystem1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090892" comment="libboost_graph1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090893" comment="libboost_graph1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090894" comment="libboost_iostreams1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090895" comment="libboost_iostreams1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090896" comment="libboost_locale1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090897" comment="libboost_math1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090898" comment="libboost_math1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090899" comment="libboost_mpi1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090900" comment="libboost_mpi1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090901" comment="libboost_program_options1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090902" comment="libboost_program_options1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090903" comment="libboost_python1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090904" comment="libboost_python1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090905" comment="libboost_random1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090906" comment="libboost_random1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090907" comment="libboost_regex1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090908" comment="libboost_regex1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090909" comment="libboost_serialization1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090910" comment="libboost_serialization1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090911" comment="libboost_signals1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090912" comment="libboost_signals1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090913" comment="libboost_system1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090914" comment="libboost_system1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090915" comment="libboost_test1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090916" comment="libboost_test1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090917" comment="libboost_thread1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090918" comment="libboost_thread1_49_0-32bit-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090919" comment="libboost_timer1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090920" comment="libboost_wave1_49_0-1.49.0-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090921" comment="libboost_wave1_49_0-32bit-1.49.0-12.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:163" version="1" class="patch">
	<metadata>
		<title>glibc: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following issues in glibc:
- CVE-2012-4412: glibc: buffer overflow in strcoll
- CVE-2013-0242: glibc: DoS due to a buffer overrun in regexp matcher by
processing multibyte characters
- CVE-2013-1914: glibc: stack overflow in getaddrinfo() sorting
- CVE-2013-2207: glibc: pt_chown tricked into granting access to another
users pseudo-terminal
- CVE-2013-4237: glibc: Buffer overwrite - NAME_MAX not enforced by
readdir_r()
- bnc#805054: man 1 locale mentions nonexistant file
- bnc#813306: glibc 2.17 fprintf(stderr, ...) triggers write of undefined
values if stderr is closed
- bnc#819383: pldd a process multiple times can freeze the process
- bnc#819524: nscd segfault
- bnc#824046: glibc: blacklist code in bindresvport doesn't release lock,
results in double-lock
- bnc#839870: glibc: three integer overflows in memory allocator
- ARM: Support loading unmarked objects from cache
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090796" comment="glibc-testsuite-2.17-4.7.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090797" comment="glibc-utils-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090798" comment="glibc-utils-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090802" comment="glibc-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090803" comment="glibc-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090807" comment="glibc-devel-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090808" comment="glibc-devel-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090811" comment="glibc-devel-static-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090812" comment="glibc-devel-static-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090813" comment="glibc-extra-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090815" comment="glibc-i18ndata-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090816" comment="glibc-info-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090817" comment="glibc-locale-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090818" comment="glibc-locale-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090821" comment="glibc-obsolete-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090823" comment="glibc-profile-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090824" comment="glibc-profile-32bit-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090825" comment="nscd-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090827" comment="glibc-html-2.17-4.7.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090828" comment="glibc-testsuite-2.17-4.7.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:164" version="1" class="patch">
	<metadata>
		<title>systemd: bugfix and security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This systemd update fixes several security and non-security issues.

- polkit-Avoid-race-condition-in-scraping-proc.patch:
  VUL-0: polkit: process subject race condition (bnc#836932)
  CVE-2013-4288.
- Don't use a trigger to create symlink for sysctl.conf, always run
  the test on %post (bnc#840864).
- Move symlink migration trigger to post (bnc#821800).
- Add systemd-fix-crash-listing-session-files.patch (bnc#840055).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090930" comment="libudev-mini-devel-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090931" comment="libudev-mini1-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090932" comment="systemd-mini-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090933" comment="systemd-mini-analyze-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090934" comment="systemd-mini-devel-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090935" comment="systemd-mini-sysvinit-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090936" comment="udev-mini-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090937" comment="libgudev-1_0-0-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090938" comment="libgudev-1_0-0-32bit-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090939" comment="libgudev-1_0-devel-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090940" comment="libudev-devel-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090941" comment="libudev1-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090942" comment="libudev1-32bit-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090943" comment="systemd-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090944" comment="systemd-32bit-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090945" comment="systemd-analyze-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090946" comment="systemd-devel-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090947" comment="systemd-logger-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090948" comment="systemd-sysvinit-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090949" comment="typelib-1_0-GUdev-1_0-195-13.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090950" comment="udev-195-13.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:165" version="1" class="patch">
	<metadata>
		<title>update for icedtea-web</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This icedtea-web update fixes several security issues.

Changes in icedtea-web:
- update to 1.4.1 (bnc#840572)
* Improved and cleaned Temporary internet files panel
* NetX
  - PR1465 - java.io.FileNotFoundException while trying to download a JAR file
  - PR1473 - javaws should not depend on name of local file
* Plugin
  - PR854: Resizing an applet several times causes 100% CPU load
* Security Updates
  - CVE-2013-4349, RH869040: Heap-based buffer overflow after triggering event attached to applet
    CVE-2012-4540 nit fixed in icedtea-web 1.4
* Misc 
  - reproducers tests are enabled in dist-tarball
  - application context support for  OpenJDK build 25 and higher
  - small patches into rhino support and
  - PR1533: Inherit jnlp.packEnabled and jnlp.versionEnabled like other properties
- need jpackage-utils on older distros
- run more tests in %check
- drop icedtea-web-AppContext.patch, already upstream

- add javapackages-tools to build requires
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090829" comment="icedtea-web-1.4.1-4.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090832" comment="icedtea-web-javadoc-1.4.1-4.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:166" version="1" class="patch">
	<metadata>
		<title>kernel: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The Linux Kernel was updated to fix various security issues and bugs.

- sctp: Use correct sideffect command in duplicate cookie handling
  (bnc#826102, CVE-2013-2206).

- Drivers: hv: util: Fix a bug in util version negotiation code
  (bnc#838346).

- vmxnet3: prevent div-by-zero panic when ring resizing
  uninitialized dev (bnc#833321).

- md/raid1,5,10: Disable WRITE SAME until a recovery strategy
  is in place (bnc#813889).

- netback: don't disconnect frontend when seeing oversize packet
  (bnc#823342).
- netfront: reduce gso_max_size to account for max TCP header.
- netfront: fix kABI after &amp;quot;reduce gso_max_size to account for
  max TCP header&amp;quot;.
- backends: Check for insane amounts of requests on the ring.
- Refresh other Xen patches (bnc#804198, bnc#814211, bnc#826374).

- Fix TLB gather virtual address range invalidation corner cases
  (TLB gather memory corruption).
- mm: fix the TLB range flushed when __tlb_remove_page() runs
  out of slots (TLB gather memory corruption).

- bnx2x: protect different statistics flows (bnc#814336).

- Drivers: hv: util: Fix a bug in version negotiation code for
  util services (bnc#828714).

- kabi/severities: Ignore changes in drivers/hv

- e1000e: workaround DMA unit hang on I218 (bnc#834647).
- e1000e: unexpected &amp;quot;Reset adapter&amp;quot; message when cable pulled
  (bnc#834647).
- e1000e: 82577: workaround for link drop issue (bnc#834647).
- e1000e: helper functions for accessing EMI registers
  (bnc#834647).

- atl1c: Fix misuse of netdev_alloc_skb in refilling rx ring
  (bnc#812116).

- reiserfs: Fixed double unlock in reiserfs_setattr failure path.

- reiserfs: locking, release lock around quota operations
  (bnc#815320).
- reiserfs: locking, handle nested locks properly (bnc#815320).
- reiserfs: locking, push write lock out of xattr code
  (bnc#815320).

- af_key: fix info leaks in notify messages
  (bnc#827749 CVE-2013-2234).
- af_key: initialize satype in key_notify_policy_flush()
  (bnc#828119 CVE-2013-2237).

- kernel/signal.c: stop info leak via the tkill and the tgkill
  syscalls (bnc#823267 CVE-2013-2141).

- b43: stop format string leaking into error msgs (bnc#822579
  CVE-2013-2852).

- net: fix incorrect credentials passing (bnc#816708
  CVE-2013-1979).

- tipc: fix info leaks via msg_name in recv_msg/recv_stream
  (bnc#816668 CVE-2013-3235).

- rose: fix info leak via msg_name in rose_recvmsg() (bnc#816668
  CVE-2013-3234).

- NFC: llcp: fix info leaks via msg_name in llcp_sock_recvmsg()
  (bnc#816668 CVE-2013-3233).

- netrom: fix info leak via msg_name in nr_recvmsg()
  (bnc#816668 CVE-2013-3232).

- llc: Fix missing msg_namelen update in llc_ui_recvmsg()
  (bnc#816668 CVE-2013-3231).

- l2tp: fix info leak in l2tp_ip6_recvmsg() (bnc#816668 CVE-2013-3230).

- iucv: Fix missing msg_namelen update in iucv_sock_recvmsg()
  (bnc#816668 CVE-2013-3229).

- irda: Fix missing msg_namelen update in irda_recvmsg_dgram()
  (bnc#816668 CVE-2013-3228).

- caif: Fix missing msg_namelen update in caif_seqpkt_recvmsg()
  (bnc#816668 CVE-2013-3227).

- Bluetooth: RFCOMM - Fix missing msg_namelen update in
  rfcomm_sock_recvmsg() (bnc#816668 CVE-2013-3226).

- Bluetooth: fix possible info leak in bt_sock_recvmsg()
  (bnc#816668 CVE-2013-3224).

- ax25: fix info leak via msg_name in ax25_recvmsg() (bnc#816668
  CVE-2013-3223).

- atm: update msg_namelen in vcc_recvmsg() (bnc#816668
  CVE-2013-3222).

- ipv6: call udp_push_pending_frames when uncorking a socket with
  (bnc#831058, CVE-2013-4162).

- tracing: Fix possible NULL pointer dereferences (bnc#815256
  CVE-2013-3301).

- tg3: fix length overflow in VPD firmware parsing (bnc#813733
  CVE-2013-1929).

- dcbnl: fix various netlink info leaks (bnc#810473
  CVE-2013-2634).

- rtnl: fix info leak on RTM_GETLINK request for VF devices
  (bnc#810473 CVE-2013-2635).

- crypto: user - fix info leaks in report API (bnc#809906
  CVE-2013-2546 CVE-2013-2547 CVE-2013-2548).

- kernel/signal.c: use __ARCH_HAS_SA_RESTORER instead of
  SA_RESTORER (bnc#808827 CVE-2013-0914).
- signal: always clear sa_restorer on execve (bnc#808827
  CVE-2013-0914).
- signal: Define __ARCH_HAS_SA_RESTORER so we know whether to
  clear sa_restorer (bnc#808827 CVE-2013-0914).

- ipv6: ip6_sk_dst_check() must not assume ipv6 dst (bnc#827750,
  CVE-2013-2232).

- xfs: fix _xfs_buf_find oops on blocks beyond the filesystem end
  (CVE-2013-1819 bnc#807471).

- blk: avoid divide-by-zero with zero discard granularity (bnc#832615).

- dlm: check the write size from user (bnc#831956).

- drm/i915: Serialize almost all register access (bnc#823633).
- drm/i915: initialize gt_lock early with other spin locks
  (bnc#801341).
- drm/i915: fix up gt init sequence fallout (bnc#801341).

- drm/nouveau/hwmon: s/fan0/fan1/.

- Drivers: hv: balloon: Do not post pressure status if interrupted
  (bnc#829539).

- drm/i915: Clear FORCEWAKE when taking over from BIOS
  (bnc#801341).

- drm/i915: Apply alignment restrictions on scanout surfaces
  for VT-d (bnc#818561).

- fs/notify/inode_mark.c: make fsnotify_find_inode_mark_locked()
  static (bnc#807188).
- fsnotify: change locking order (bnc#807188).
- fsnotify: dont put marks on temporary list when clearing marks
  by group (bnc#807188).
- fsnotify: introduce locked versions of fsnotify_add_mark()
  and fsnotify_remove_mark() (bnc#807188).
- fsnotify: pass group to fsnotify_destroy_mark() (bnc#807188).
- fsnotify: use a mutex instead of a spinlock to protect a groups
  mark list (bnc#807188).
- fanotify: add an extra flag to mark_remove_from_mask that
  indicates wheather a mark should be destroyed (bnc#807188).
- fsnotify: take groups mark_lock before mark lock (bnc#807188).
- fsnotify: use reference counting for groups (bnc#807188).
- fsnotify: introduce fsnotify_get_group() (bnc#807188).
- inotify, fanotify: replace fsnotify_put_group() with
  fsnotify_destroy_group() (bnc#807188).

- drm/i915: fix long-standing SNB regression in power consumption
  after resume v2 (bnc#801341).

- drm/nouveau: use vmalloc for pgt allocation (bnc#802347).

- USB: xhci: correctly enable interrupts (bnc#828191).

- drm/i915: Resurrect ring kicking for semaphores, selectively
  (bnc#823633,bnc#799516).

- ALSA: usb-audio: Fix invalid volume resolution for Logitech
  HD Webcam c310 (bnc#821735).
- ALSA: usb-audio - Fix invalid volume resolution on Logitech
  HD webcam c270 (bnc#821735).

- config: sync up config options added with btrfs update

- xfs: xfs: fallback to vmalloc for large buffers in
  xfs_compat_attrlist_by_handle (bnc#818053 bnc#807153).
- xfs: fallback to vmalloc for large buffers in
  xfs_attrlist_by_handle (bnc#818053 bnc#807153).

- btrfs: update to v3.10.
  - block: Add bio_end_sector().
  - block: Use bio_sectors() more consistently.
  - btrfs: handle lookup errors after subvol/snapshot creation.
  - btrfs: add new ioctl to determine size of compressed file
    (FATE#306586).
  - btrfs: reduce btrfs_path size (FATE#306586).
  - btrfs: simplify move_pages and copy_pages (FATE#306586).
  - Prefix mount messages with btrfs: for clarity (FATE#306586).
  - Btrfs: forced readonly when free_log_tree fails (FATE#306586).
  - Btrfs: forced readonly when orphan_del fails (FATE#306586).
  - btrfs: abort unlink trans in missed error case.
  - btrfs: access superblock via pagecache in scan_one_device.
  - Btrfs: account for orphan inodes properly during cleanup.
  - Btrfs: add a comment for fs_info-&amp;gt;max_inline.
  - Btrfs: add a incompatible format change for smaller metadata
    extent refs.
  - Btrfs: Add a new ioctl to get the label of a mounted file
    system.
  - Btrfs: add a plugging callback to raid56 writes.
  - Btrfs: add a rb_tree to improve performance of ulist search.
  - Btrfs: Add a stripe cache to raid56.
  - Btrfs: Add ACCESS_ONCE() to transaction-&amp;gt;abort accesses.
  - Btrfs: add all ioctl checks before user change for quota
    operations.
  - Btrfs: add btrfs_scratch_superblock() function.
  - btrfs: add cancellation points to defrag.
  - Btrfs: add code to scrub to copy read data to another disk.
  - btrfs: add debug check for extent_io range alignment.
  - Btrfs: add fiemap's flag check.
  - Btrfs: add ioctl to wait for qgroup rescan completion.
  - btrfs: add missing break in btrfs_print_leaf().
  - Btrfs: add new sources for device replace code.
  - btrfs: add &amp;quot;no file data&amp;quot; flag to btrfs send ioctl.
  - Btrfs: add orphan before truncating pagecache.
  - Btrfs: add path-&amp;gt;really_keep_locks.
  - btrfs: add prefix to sanity tests messages.
  - Btrfs: add rw argument to merge_bio_hook().
  - Btrfs: add some free space cache tests.
  - Btrfs: add some missing iput()'s in btrfs_orphan_cleanup.
  - Btrfs: add support for device replace ioctls.
  - Btrfs: add tree block level sanity check.
  - Btrfs: add two more find_device() methods.
  - Btrfs: allocate new chunks if the space is not enough for
    global rsv.
  - Btrfs: allow file data clone within a file.
  - Btrfs: allow for selecting only completely empty chunks.
  - Btrfs: allow omitting stream header and end-cmd for btrfs send.
  - Btrfs: allow repair code to include target disk when searching
    mirrors.
  - Btrfs: allow running defrag in parallel to administrative tasks.
  - Btrfs: allow superblock mismatch from older mkfs.
  - btrfs: annotate intentional switch case fallthroughs.
  - btrfs: annotate quota tree for lockdep.
  - Btrfs: automatic rescan after &amp;quot;quota enable&amp;quot; command.
  - Btrfs: avoid deadlock on transaction waiting list.
  - Btrfs: avoid double free of fs_info-&amp;gt;qgroup_ulist.
  - Btrfs: avoid risk of a deadlock in btrfs_handle_error.
  - Btrfs: bring back balance pause/resume logic.
  - Btrfs: build up error handling for merge_reloc_roots.
  - Btrfs: change core code of btrfs to support the device replace
    operations.
  - Btrfs: changes to live filesystem are also written to
    replacement disk.
  - Btrfs: Check CAP_DAC_READ_SEARCH for BTRFS_IOC_INO_PATHS.
  - Btrfs: check for actual acls rather than just xattrs when
    caching no acl.
  - Btrfs: check for NULL pointer in updating reloc roots.
  - Btrfs: check if leaf's parent exists before pushing items
    around.
  - Btrfs: check if we can nocow if we don't have data space.
  - Btrfs: check return value of commit when recovering log.
  - Btrfs: check the return value of btrfs_run_ordered_operations().
  - Btrfs: check the return value of btrfs_start_delalloc_inodes().
  - btrfs: clean snapshots one by one.
  - btrfs: clean up transaction abort messages.
  - Btrfs: cleanup backref search commit root flag stuff.
  - Btrfs: cleanup, btrfs_read_fs_root_no_name() doesn't return
    NULL.
  - Btrfs: cleanup destroy_marked_extents.
  - Btrfs: cleanup: don't check the same thing twice.
  - Btrfs: cleanup duplicated division functions.
  - Btrfs: cleanup for btrfs_btree_balance_dirty.
  - Btrfs: cleanup for btrfs_wait_order_range.
  - btrfs: cleanup for open-coded alignment.
  - Btrfs: cleanup fs roots if we fail to mount.
  - Btrfs: cleanup of function where btrfs_extend_item() is called.
  - Btrfs: cleanup of function where fixup_low_keys() is called.
  - Btrfs: cleanup orphan reservation if truncate fails.
  - Btrfs: cleanup orphaned root orphan item.
  - Btrfs: cleanup redundant code in btrfs_submit_direct().
  - Btrfs: cleanup scrub bio and worker wait code.
  - Btrfs: cleanup similar code in delayed inode.
  - btrfs: Cleanup some redundant codes in btrfs_log_inode().
  - btrfs: Cleanup some redundant codes in
    btrfs_lookup_csums_range().
  - Btrfs: cleanup the code of copy_nocow_pages_for_inode().
  - Btrfs: cleanup the similar code of the fs root read.
  - Btrfs: cleanup to make the function
    btrfs_delalloc_reserve_metadata more logic.
  - Btrfs: cleanup to remove reduplicate code in transaction.c.
  - Btrfs: cleanup unnecessary assignment when cleaning up all
    the residual transaction.
  - Btrfs: cleanup unnecessary clear when freeing a transaction
    or a trans handle.
  - Btrfs: cleanup unused arguments.
  - Btrfs: cleanup unused arguments in send.c.
  - Btrfs: cleanup unused arguments of btrfs_csum_data.
  - Btrfs: cleanup unused function.
  - Btrfs: clear received_uuid field for new writable snapshots.
  - Btrfs: Cocci spatch &amp;quot;memdup.spatch&amp;quot;.
  - Btrfs: Cocci spatch &amp;quot;ptr_ret.spatch&amp;quot;.
  - Btrfs: compare relevant parts of delayed tree refs.
  - Btrfs: copy everything if we've created an inline extent.
  - btrfs: cover more error codes in btrfs_decode_error.
  - Btrfs: creating the subvolume qgroup automatically when
    enabling quota.
  - Btrfs: deal with bad mappings in btrfs_map_block.
  - Btrfs: deal with errors in write_dev_supers.
  - Btrfs: deal with free space cache errors while replaying log.
  - btrfs: define BTRFS_MAGIC as a u64 value.
  - Btrfs: delete inline extents when we find them during logging.
  - Btrfs: delete unused function.
  - Btrfs: delete unused parameter to btrfs_read_root_item().
  - btrfs: deprecate subvolrootid mount option.
  - btrfs: device delete to get errors from the kernel.
  - Btrfs: disable qgroup id 0.
  - Btrfs: disallow mutually exclusive admin operations from
    user mode.
  - Btrfs: disallow some operations on the device replace target
    device.
  - btrfs: do away with non-whole_page extent I/O.
  - Btrfs: do delay iput in sync_fs.
  - Btrfs: do not allow logged extents to be merged or removed.
  - Btrfs: do not BUG_ON in prepare_to_reloc.
  - Btrfs: do not BUG_ON on aborted situation.
  - Btrfs: do not call file_update_time in aio_write.
  - Btrfs: do not change inode flags in rename.
  - Btrfs: do not continue if out of memory happens.
  - Btrfs: do not delete a subvolume which is in a R/O subvolume.
  - Btrfs: do not log extents when we only log new names.
  - Btrfs: do not mark ems as prealloc if we are writing to them.
  - Btrfs: do not merge logged extents if we've removed them from
    the tree.
  - Btrfs: do not overcommit if we don't have enough space for
    global rsv.
  - Btrfs: do not pin while under spin lock.
  - Btrfs: do not warn_on io_ctl-&amp;gt;cur in io_ctl_map_page.
  - Btrfs: don't abort the current transaction if there is no
    enough space for inode cache.
  - Btrfs: don't add a NULL extended attribute.
  - Btrfs: don't allow degraded mount if too many devices are
    missing.
  - Btrfs: don't allow device replace on RAID5/RAID6.
  - Btrfs: don't auto defrag a file when doing directIO.
  - Btrfs: don't bother copying if we're only logging the inode.
  - Btrfs: don't BUG_ON() in btrfs_num_copies.
  - Btrfs: don't call btrfs_qgroup_free if just btrfs_qgroup_reserve
    fails.
  - Btrfs: don't call readahead hook until we have read the
    entire eb.
  - Btrfs: don't delete fs_roots until after we cleanup the
    transaction.
  - Btrfs: don't drop path when printing out tree errors in scrub.
  - Btrfs: don't flush the delalloc inodes in the while loop if
    flushoncommit is set.
  - Btrfs: don't force pages under writeback to finish when
    aborting.
  - Btrfs: don't invoke btrfs_invalidate_inodes() in the spin
    lock context.
  - Btrfs: don't memset new tokens.
  - Btrfs: don't null pointer deref on abort.
  - Btrfs: don't panic if we're trying to drop too many refs.
  - Btrfs: don't re-enter when allocating a chunk.
  - Btrfs: don't start a new transaction when starting sync.
  - Btrfs: don't steal the reserved space from the global reserve
    if their space type is different.
  - btrfs: don't stop searching after encountering the wrong item.
  - Btrfs: don't take inode delalloc mutex if we're a free space
    inode.
  - Btrfs: don't traverse the ordered operation list repeatedly.
  - Btrfs: Don't trust the superblock label and simply printk(&amp;quot;%s&amp;quot;)
    it.
  - Btrfs: don't try and free ebs twice in log replay.
  - btrfs: don't try to notify udev about missing devices.
  - Btrfs: don't use global block reservation for inode cache
    truncation.
  - Btrfs: don't wait for all the writers circularly during the
    transaction commit.
  - Btrfs: don't wait on ordered extents if we have a trans open.
  - Btrfs: dont do log_removal in insert_new_root.
  - btrfs: Drop inode if inode root is NULL.
  - Btrfs: eliminate a use-after-free in btrfs_balance().
  - Btrfs: enforce min_bytes parameter during extent allocation.
  - Btrfs: enhance btrfs structures for device replace support.
  - btrfs: enhance superblock checks.
  - btrfs: ensure we don't overrun devices_info in
    __btrfs_alloc_chunk.
  - Btrfs: exclude logged extents before replying when we are mixed.
  - Btrfs: explicitly use global_block_rsv for quota_tree.
  - Btrfs: extend the checksum item as much as possible.
  - btrfs: fall back to global reservation when removing subvolumes.
  - Btrfs: fill the global reserve when unpinning space.
  - Btrfs: fix a bug of per-file nocow.
  - Btrfs: fix a bug when llseek for delalloc bytes behind prealloc
    extents.
  - Btrfs: fix a build warning for an unused label.
  - Btrfs: fix a deadlock in aborting transaction due to ENOSPC.
  - Btrfs: fix a double free on pending snapshots in error handling.
  - Btrfs: fix a mismerge in btrfs_balance().
  - Btrfs: fix a regression in balance usage filter.
  - Btrfs: fix a scrub regression in case of write errors.
  - Btrfs: fix a warning when disabling quota.
  - Btrfs: fix a warning when updating qgroup limit.
  - Btrfs: fix accessing a freed tree root.
  - Btrfs: fix accessing the root pointer in tree mod log functions.
  - Btrfs: fix all callers of read_tree_block.
  - Btrfs: fix an while-loop of listxattr.
  - Btrfs: fix autodefrag and umount lockup.
  - Btrfs: fix backref walking race with tree deletions.
  - Btrfs: fix bad extent logging.
  - Btrfs: fix broken nocow after balance.
  - btrfs: fix btrfs_cont_expand() freeing IS_ERR em.
  - btrfs: fix btrfs_extend_item() comment.
  - Btrfs: fix BUG() in scrub when first superblock reading
    gives EIO.
  - Btrfs: fix check on same raid type flag twice.
  - Btrfs: fix chunk allocation error handling.
  - Btrfs: fix cleaner thread not working with inode cache option.
  - Btrfs: fix cluster alignment for mount -o ssd.
  - btrfs: fix comment typos.
  - Btrfs: fix confusing edquot happening case.
  - Btrfs: fix crash in log replay with qgroups enabled.
  - Btrfs: fix crash regarding to ulist_add_merge.
  - Btrfs: fix deadlock due to unsubmitted.
  - Btrfs: fix double free in the btrfs_qgroup_account_ref().
  - Btrfs: fix double free in the iterate_extent_inodes().
  - Btrfs: fix EDQUOT handling in btrfs_delalloc_reserve_metadata.
  - Btrfs: fix EIO from btrfs send in is_extent_unchanged for
    punched holes.
  - Btrfs: fix error handling in btrfs_ioctl_send().
  - Btrfs: fix error handling in make/read block group.
  - Btrfs: fix estale with btrfs send.
  - Btrfs: fix extent logging with O_DIRECT into prealloc.
  - Btrfs: fix freeing delayed ref head while still holding
    its mutex.
  - Btrfs: fix freeze vs auto defrag.
  - Btrfs: fix hash overflow handling.
  - Btrfs: fix how we discard outstanding ordered extents on abort.
  - Btrfs: fix infinite loop when we abort on mount.
  - Btrfs: fix joining the same transaction handler more than
    2 times.
  - Btrfs: fix lockdep warning.
  - Btrfs: fix locking on ROOT_REPLACE operations in tree mod log.
  - Btrfs: fix lots of orphan inodes when the space is not enough.
  - Btrfs: fix max chunk size on raid5/6.
  - Btrfs: fix memory leak in btrfs_create_tree().
  - Btrfs: fix memory leak in name_cache_insert().
  - Btrfs: fix memory leak of log roots.
  - Btrfs: fix memory leak of pending_snapshot-&amp;gt;inherit.
  - Btrfs: fix memory patcher through fs_info-&amp;gt;qgroup_ulist.
  - btrfs: fix minor typo in comment.
  - btrfs: fix misleading variable name for flags.
  - Btrfs: fix missed transaction-&amp;gt;aborted check.
  - Btrfs: fix missing check about ulist_add() in qgroup.c.
  - Btrfs: fix missing check before creating a qgroup relation.
  - Btrfs: fix missing check before disabling quota.
  - Btrfs: fix missing check in the btrfs_qgroup_inherit().
  - Btrfs: fix missing deleted items in btrfs_clean_quota_tree.
  - Btrfs: fix missing flush when committing a transaction.
  - Btrfs: fix missing i_size update.
  - Btrfs: fix missing log when BTRFS_INODE_NEEDS_FULL_SYNC is set.
  - Btrfs: fix missing qgroup reservation before fallocating.
  - Btrfs: fix missing release of qgroup reservation in
    commit_transaction().
  - Btrfs: fix missing release of the space/qgroup reservation
    in start_transaction().
  - Btrfs: fix missing reserved space release in error path of
    delalloc reservation.
  - Btrfs: fix missing write access release in btrfs_ioctl_resize().
  - Btrfs: fix &amp;quot;mutually exclusive op is running&amp;quot; error code.
  - Btrfs: fix not being able to find skinny extents during
    relocate.
  - Btrfs: fix NULL pointer after aborting a transaction.
  - Btrfs: fix off-by-one error of the reserved size of
    btrfs_allocate().
  - Btrfs: fix off-by-one error of the same page check in
    btrfs_punch_hole().
  - Btrfs: fix off-by-one in fiemap.
  - Btrfs: fix off-by-one in lseek.
  - Btrfs: fix oops when recovering the file data by scrub function.
  - Btrfs: fix panic when recovering tree log.
  - Btrfs: fix permissions of empty files not affected by umask.
  - Btrfs: fix permissions of empty files not affected by umask.
  - Btrfs: fix possible infinite loop in slow caching.
  - Btrfs: fix possible memory leak in replace_path().
  - Btrfs: fix possible memory leak in the find_parent_nodes().
  - Btrfs: fix possible stale data exposure.
  - Btrfs: Fix printk and variable name.
  - Btrfs: fix qgroup rescan resume on mount.
  - Btrfs: fix race between mmap writes and compression.
  - Btrfs: fix race between snapshot deletion and getting inode.
  - Btrfs: fix race in check-integrity caused by usage of bitfield.
  - Btrfs: fix reada debug code compilation.
  - Btrfs: fix remount vs autodefrag.
  - Btrfs: fix repeated delalloc work allocation.
  - Btrfs: fix resize a readonly device.
  - Btrfs: fix several potential problems in
    copy_nocow_pages_for_inode.
  - Btrfs: fix space accounting for unlink and rename.
  - Btrfs: fix space leak when we fail to reserve metadata space.
  - btrfs: fix the code comments for LZO compression workspace.
  - Btrfs: fix the comment typo for
    btrfs_attach_transaction_barrier.
  - Btrfs: fix the deadlock between the transaction start/attach
    and commit.
  - Btrfs: fix the page that is beyond EOF.
  - Btrfs: fix the qgroup reserved space is released prematurely.
  - Btrfs: fix the race between bio and btrfs_stop_workers.
  - Btrfs: fix transaction throttling for delayed refs.
  - Btrfs: fix tree mod log regression on root split operations.
  - Btrfs: fix trivial error in btrfs_ioctl_resize().
  - Btrfs: Fix typo in fs/btrfs.
  - Btrfs: fix unblocked autodefraggers when remount.
  - Btrfs: fix unclosed transaction handler when the async
    transaction commitment fails.
  - Btrfs: fix uncompleted transaction.
  - Btrfs: fix unlock after free on rewinded tree blocks.
  - Btrfs: fix unlock order in btrfs_ioctl_resize.
  - Btrfs: fix unlock order in btrfs_ioctl_rm_dev.
  - Btrfs: fix unnecessary while loop when search the free space,
    cache.
  - Btrfs: fix unprotected defragable inode insertion.
  - Btrfs: fix unprotected extent map operation when logging
    file extents.
  - Btrfs: fix unprotected root node of the subvolume's inode
    rb-tree.
  - Btrfs: fix use-after-free bug during umount.
  - btrfs: fix varargs in __btrfs_std_error.
  - Btrfs: fix warning of free_extent_map.
  - Btrfs: fix warning when creating snapshots.
  - Btrfs: fix wrong comment in can_overcommit().
  - Btrfs: fix wrong file extent length.
  - Btrfs: fix wrong handle at error path of create_snapshot()
    when the commit fails.
  - Btrfs: fix wrong max device number for single profile.
  - Btrfs: fix wrong mirror number tuning.
  - Btrfs: fix wrong outstanding_extents when doing DIO write.
  - Btrfs: fix wrong reservation of csums.
  - Btrfs: fix wrong reserved space in qgroup during snap/subv
    creation.
  - Btrfs: fix wrong reserved space when deleting a
    snapshot/subvolume.
  - Btrfs: fix wrong return value of btrfs_lookup_csum().
  - Btrfs: fix wrong return value of btrfs_truncate_page().
  - Btrfs: fix wrong return value of btrfs_wait_for_commit().
  - Btrfs: fix wrong sync_writers decrement in
    btrfs_file_aio_write().
  - btrfs: fixup/remove module.h usage as required.
  - Btrfs: flush all dirty inodes if writeback can not start.
  - Btrfs: free all recorded tree blocks on error.
  - Btrfs: free csums when we're done scrubbing an extent.
  - Btrfs: get better concurrency for snapshot-aware defrag work.
  - Btrfs: get right arguments for btrfs_wait_ordered_range.
  - btrfs: get the device in write mode when deleting it.
  - Btrfs: get write access for qgroup operations.
  - Btrfs: get write access for scrub.
  - Btrfs: get write access when doing resize fs.
  - Btrfs: get write access when removing a device.
  - Btrfs: get write access when setting the default subvolume.
  - Btrfs: handle a bogus chunk tree nicely.
  - Btrfs: handle errors from btrfs_map_bio() everywhere.
  - Btrfs: handle errors in compression submission path.
  - btrfs: handle errors returned from get_tree_block_key.
  - btrfs: handle null fs_info in btrfs_panic().
  - Btrfs: handle running extent ops with skinny metadata.
  - Btrfs: hold the ordered operations mutex when waiting on
    ordered extents.
  - Btrfs: hold the tree mod lock in __tree_mod_log_rewind.
  - Btrfs: if we aren't committing just end the transaction if we
    error out.
  - btrfs: ignore device open failures in __btrfs_open_devices.
  - Btrfs: ignore orphan qgroup relations.
  - Btrfs: implement unlocked dio write.
  - Btrfs: improve the delayed inode throttling.
  - Btrfs: improve the loop of scrub_stripe.
  - Btrfs: improve the noflush reservation.
  - Btrfs: improve the performance of the csums lookup.
  - Btrfs: in scrub repair code, optimize the reading of mirrors.
  - Btrfs: in scrub repair code, simplify alloc error handling.
  - Btrfs: Include the device in most error printk()s.
  - Btrfs: increase BTRFS_MAX_MIRRORS by one for dev replace.
  - btrfs: Init io_lock after cloning btrfs device struct.
  - Btrfs: init relocate extent_io_tree with a mapping.
  - Btrfs: inline csums if we're fsyncing.
  - Btrfs: introduce a btrfs_dev_replace_item type.
  - Btrfs: introduce a mutex lock for btrfs quota operations.
  - Btrfs: introduce GET_READ_MIRRORS functionality for
    btrfs_map_block().
  - Btrfs: introduce grab/put functions for the root of the
    fs/file tree.
  - Btrfs: introduce per-subvolume delalloc inode list.
  - Btrfs: introduce per-subvolume ordered extent list.
  - Btrfs: introduce qgroup_ulist to avoid frequently
    allocating/freeing ulist.
  - Btrfs: just flush the delalloc inodes in the source tree before
    snapshot creation.
  - Btrfs: keep track of the extents original block length.
  - Btrfs: kill replicate code in replay_one_buffer.
  - Btrfs: kill some BUG_ONs() in the find_parent_nodes().
  - Btrfs: kill unnecessary arguments in del_ptr.
  - Btrfs: kill unused argument of btrfs_pin_extent_for_log_replay.
  - Btrfs: kill unused argument of update_block_group.
  - Btrfs: kill unused arguments of cache_block_group.
  - Btrfs: let allocation start from the right raid type.
  - btrfs: limit fallocate extent reservation to 256MB.
  - Btrfs: limit the global reserve to 512mb.
  - btrfs: list_entry can't return NULL.
  - Btrfs: log changed inodes based on the extent map tree.
  - Btrfs: log ram bytes properly.
  - Btrfs: make __merge_refs() return type be void.
  - Btrfs: make backref walking code handle skinny metadata.
  - Btrfs: make delalloc inodes be flushed by multi-task.
  - Btrfs: make delayed ref lock logic more readable.
  - Btrfs: make ordered extent be flushed by multi-task.
  - Btrfs: make ordered operations be handled by multi-task.
  - btrfs: make orphan cleanup less verbose.
  - Btrfs: make raid attr array more readable.
  - btrfs: make static code static &amp;amp; remove dead code.
  - btrfs: make subvol creation/deletion killable in the early
    stages.
  - Btrfs: make sure nbytes are right after log replay.
  - Btrfs: make sure NODATACOW also gets NODATASUM set.
  - Btrfs: make sure roots are assigned before freeing their nodes.
  - Btrfs: make the chunk allocator completely tree lockless.
  - Btrfs: make the cleaner complete early when the fs is going
    to be umounted.
  - Btrfs: make the scrub page array dynamically allocated.
  - Btrfs: make the snap/subv deletion end more early when the fs
    is R/O.
  - Btrfs: make the state of the transaction more readable.
  - Btrfs: merge inode_list in __merge_refs.
  - Btrfs: merge pending IO for tree log write back.
  - btrfs: merge save_error_info helpers into one.
  - Btrfs: MOD_LOG_KEY_REMOVE_WHILE_MOVING never change node's
    nritems.
  - btrfs: more open-coded file_inode().
  - Btrfs: move btrfs_truncate_page to btrfs_cont_expand instead
    of btrfs_truncate.
  - Btrfs: move checks in set_page_dirty under DEBUG.
  - Btrfs: move d_instantiate outside the transaction during
    mksubvol.
  - Btrfs: move fs/btrfs/ioctl.h to include/uapi/linux/btrfs.h.
  - btrfs: move ifdef around sanity checks out of init_btrfs_fs.
  - btrfs: move leak debug code to functions.
  - Btrfs: move some common code into a subfunction.
  - Btrfs: move the R/O check out of
    btrfs_clean_one_deleted_snapshot().
  - btrfs: Notify udev when removing device.
  - Btrfs: only clear dirty on the buffer if it is marked as dirty.
  - Btrfs: only do the tree_mod_log_free_eb if this is our last ref.
  - Btrfs: only exclude supers in the range of our block group.
  - Btrfs: only log the inode item if we can get away with it.
  - Btrfs: only unlock and relock if we have to.
  - Btrfs: optimize leaf_space_used.
  - Btrfs: optimize read_block_for_search.
  - Btrfs: optimize reada_for_balance.
  - Btrfs: optimize the error handle of use_block_rsv().
  - Btrfs: optionally avoid reads from device replace source drive.
  - Btrfs: pass fs_info instead of root.
  - Btrfs: pass fs_info to btrfs_map_block() instead of
    mapping_tree.
  - Btrfs: Pass fs_info to btrfs_num_copies() instead of
    mapping_tree.
  - Btrfs: pass NULL instead of 0.
  - Btrfs: pass root object into btrfs_ioctl_{start, wait}_sync().
  - Btrfs: pause the space balance when remounting to R/O.
  - Btrfs: place ordered operations on a per transaction list.
  - Btrfs: prevent qgroup destroy when there are still relations.
  - Btrfs: protect devices list with its mutex.
  - Btrfs: protect fs_info-&amp;gt;alloc_start.
  - Btrfs: punch hole past the end of the file.
  - Btrfs: put csums on the right ordered extent.
  - Btrfs: put our inode if orphan cleanup fails.
  - Btrfs: put raid properties into global table.
  - btrfs: put some enospc messages under enospc_debug.
  - Btrfs: RAID5 and RAID6.
  - btrfs/raid56: Add missing #include &amp;lt;linux/vmalloc.h&amp;gt;.
  - btrfs: read entire device info under lock.
  - Btrfs: recheck bio against block device when we map the bio.
  - Btrfs: record first logical byte in memory.
  - Btrfs: reduce CPU contention while waiting for delayed extent
    operations.
  - Btrfs: reduce lock contention on extent buffer locks.
  - Btrfs: refactor error handling to drop inode in btrfs_create().
  - Btrfs: relax the block group size limit for bitmaps.
  - btrfs: remove a printk from scan_one_device.
  - Btrfs: remove almost all of the BUG()'s from tree-log.c.
  - Btrfs: remove btrfs_sector_sum structure.
  - Btrfs: remove btrfs_try_spin_lock.
  - Btrfs: remove BUG_ON() in btrfs_read_fs_tree_no_radix().
  - btrfs: remove cache only arguments from defrag path.
  - Btrfs: remove conflicting check for minimum number of devices
    in raid56.
  - Btrfs: remove deprecated comments.
  - Btrfs: remove extent mapping if we fail to add chunk.
  - Btrfs: remove reduplicate check about root in the function
    btrfs_clean_quota_tree.
  - Btrfs: remove some BUG_ONs() when walking backref tree.
  - Btrfs: remove some unnecessary spin_lock usages.
  - Btrfs: remove the block device pointer from the scrub context
    struct.
  - Btrfs: remove the code for the impossible case in
    cleanup_transaction().
  - Btrfs: Remove the invalid shrink size check up from
    btrfs_shrink_dev().
  - Btrfs: remove the time check in btrfs_commit_transaction().
  - btrfs: remove unnecessary cur_trans set before goto loop in
    join_transaction.
  - btrfs: remove unnecessary DEFINE_WAIT() declarations.
  - Btrfs: remove unnecessary dget_parent/dput when creating the
    pending snapshot.
  - Btrfs: remove unnecessary -&amp;gt;s_umount in cleaner_kthread().
  - Btrfs: remove unnecessary varient -&amp;gt;num_joined in
    btrfs_transaction structure.
  - Btrfs: remove unused argument of btrfs_extend_item().
  - Btrfs: remove unused argument of fixup_low_keys().
  - Btrfs: remove unused code in btrfs_del_root.
  - Btrfs: remove unused extent io tree ops V2.
  - btrfs: remove unused fd in btrfs_ioctl_send().
  - btrfs: remove unused fs_info from btrfs_decode_error().
  - btrfs: remove unused gfp mask parameter from
    release_extent_buffer callchain.
  - btrfs: remove unused &amp;quot;item&amp;quot; in btrfs_insert_delayed_item().
  - Btrfs: remove unused variable in __process_changed_new_xattr().
  - Btrfs: remove unused variable in the iterate_extent_inodes().
  - Btrfs: remove useless copy in quota_ctl.
  - Btrfs: remove warn on in free space cache writeout.
  - Btrfs: rename root_times_lock to root_item_lock.
  - Btrfs: rename the scrub context structure.
  - Btrfs: reorder locks and sanity checks in btrfs_ioctl_defrag.
  - Btrfs: reorder tree mod log operations in deleting a pointer.
  - Btrfs: rescan for qgroups.
  - Btrfs: reset path lock state to zero.
  - Btrfs: restructure btrfs_run_defrag_inodes().
  - Btrfs: return as soon as possible when edquot happens.
  - Btrfs: return EIO if we have extent tree corruption.
  - Btrfs: return ENOMEM rather than use BUG_ON when
    btrfs_alloc_path fails.
  - Btrfs: return errno if possible when we fail to allocate memory.
  - Btrfs: return error code in
    btrfs_check_trunc_cache_free_space().
  - Btrfs: return error when we specify wrong start to defrag.
  - Btrfs: return free space in cow error path.
  - Btrfs: rework the overcommit logic to be based on the total
    size.
  - Btrfs: save us a read_lock.
  - Btrfs: select XOR_BLOCKS in Kconfig.
  - Btrfs: separate sequence numbers for delayed ref tracking and
    tree mod log.
  - Btrfs: serialize unlocked dio reads with truncate.
  - Btrfs: set/change the label of a mounted file system.
  - Btrfs: set flushing if we're limited flushing.
  - Btrfs: set hole punching time properly.
  - Btrfs: set UUID in root_item for created trees.
  - Btrfs: share stop worker code.
  - btrfs: show compiled-in config features at module load time.
  - Btrfs: simplify unlink reservations.
  - Btrfs: skip adding an acl attribute if we don't have to.
  - Btrfs: snapshot-aware defrag.
  - Btrfs: split btrfs_qgroup_account_ref into four functions.
  - Btrfs: steal from global reserve if we are cleaning up orphans.
  - Btrfs: stop all workers before cleaning up roots.
  - Btrfs: stop using try_to_writeback_inodes_sb_nr to flush
    delalloc.
  - Btrfs: stop waiting on current trans if we aborted.
  - Btrfs: traverse and flush the delalloc inodes once.
  - btrfs: try harder to allocate raid56 stripe cache.
  - Btrfs: unlock extent range on enospc in compressed submit.
  - btrfs: unpin_extent_cache: fix the typo and unnecessary
    arguements.
  - Btrfs: unreserve space if our ordered extent fails to work.
  - btrfs: update kconfig title.
  - Btrfs: update the global reserve if it is empty.
  - btrfs: update timestamps on truncate().
  - Btrfs: update to use fs_state bit.
  - Btrfs: use a btrfs bioset instead of abusing bio internals.
  - Btrfs: use a lock to protect incompat/compat flag of the
    super block.
  - Btrfs: use a percpu to keep track of possibly pinned bytes.
  - Btrfs: use bit operation for -&amp;gt;fs_state.
  - Btrfs: use common work instead of delayed work.
  - Btrfs: use ctl-&amp;gt;unit for free space calculation instead of
    block_group-&amp;gt;sectorsize.
  - Btrfs: use existing align macros in btrfs_allocate().
  - Btrfs: use helper to cleanup tree roots.
  - btrfs: use only inline_pages from extent buffer.
  - Btrfs: use percpu counter for dirty metadata count.
  - Btrfs: use percpu counter for fs_info-&amp;gt;delalloc_bytes.
  - btrfs: use rcu_barrier() to wait for bdev puts at unmount.
  - Btrfs: use REQ_META for all metadata IO.
  - Btrfs: use reserved space for creating a snapshot.
  - Btrfs: use right range to find checksum for compressed extents.
  - Btrfs: use seqlock to protect fs_info-&amp;gt;avail_{data, metadata,
    system}_alloc_bits.
  - Btrfs: use set_nlink if our i_nlink is 0.
  - Btrfs: use slabs for auto defrag allocation.
  - Btrfs: use slabs for delayed reference allocation.
  - Btrfs: use the inode own lock to protect its delalloc_bytes.
  - Btrfs: use token to avoid times mapping extent buffer.
  - Btrfs: use tokens where we can in the tree log.
  - Btrfs: use tree_root to avoid edquot when disabling quota.
  - btrfs: use unsigned long type for extent state bits.
  - Btrfs: use wrapper page_offset.
  - Btrfs: various abort cleanups.
  - Btrfs: wait on ordered extents at the last possible moment.
  - Btrfs: wait ordered range before doing direct io.
  - Btrfs: wake up delayed ref flushing waiters on abort.
  - clear chunk_alloc flag on retryable failure.
  - Correct allowed raid levels on balance.
  - Fix misspellings of &amp;quot;whether&amp;quot; in comments.
  - fs/btrfs: drop if around WARN_ON.
  - fs/btrfs: remove depends on CONFIG_EXPERIMENTAL.
  - fs/btrfs: use WARN.
  - Minor format cleanup.
  - new helper: file_inode(file).
  - Revert &amp;quot;Btrfs: fix permissions of empty files not affected
    by umask&amp;quot;.
  - Revert &amp;quot;Btrfs: MOD_LOG_KEY_REMOVE_WHILE_MOVING never change
    node's nritems&amp;quot;.
  - Revert &amp;quot;Btrfs: reorder tree mod log operations in deleting
    a pointer&amp;quot;.
  - treewide: Fix typo in printk.
  - writeback: remove nr_pages_dirtied arg from
    balance_dirty_pages_ratelimited_nr().

- drivers/cdrom/cdrom.c: use kzalloc() for failing hardware
  (bnc#824295, CVE-2013-2164).

- fanotify: info leak in copy_event_to_user() (CVE-2013-2148
  bnc#823517).

- block: do not pass disk names as format strings (bnc#822575
  CVE-2013-2851).

- libceph: Fix NULL pointer dereference in auth client code.
  (CVE-2013-1059, bnc#826350)

- Update
  patches.drivers/media-rtl28xxu-01-add-NOXON-DAB-DAB-USB-dongle-rev-2.patch
  (bnc#811882).
- Update
  patches.drivers/media-rtl28xxu-02-1b80-d3a8-ASUS-My-Cinema-U3100Mini-Pl.patch
  (bnc#811882).
- Update
  patches.drivers/media-rtl28xxu-03-add-Gigabyte-U7300-DVB-T-Dongle.patch
  (bnc#811882).
- Update
  patches.drivers/media-rtl28xxu-04-correct-some-device-names.patch
  (bnc#811882).
- Update
  patches.drivers/media-rtl28xxu-05-Support-Digivox-Mini-HD.patch
  (bnc#811882).
- Update
  patches.drivers/media-rtl28xxu-06-Add-USB-IDs-for-Compro-VideoMate-U620.patch
  (bnc#811882).
- Update
  patches.drivers/media-rtl28xxu-07-Add-USB-ID-for-MaxMedia-HU394-T.patch
  (bnc#811882).
  Correct the bnc reference.

- Update
  patches.fixes/block-discard-granularity-might-not-be-power-of-2.patch
  (bnc#823797).

- block: discard granularity might not be power of 2.

- USB: reset resume quirk needed by a hub (bnc#810144).

- NFS: Fix keytabless mounts (bnc#817651).

- ipv4: fix redirect handling for TCP packets (bnc#814510).
- Always include the git commit in KOTD builds
  This allows us not to set it explicitly in builds submitted to the
  official distribution (bnc#821612, bnc#824171).

- Btrfs: relocate csums properly with prealloc extents.
      
- gcc4: disable __compiletime_object_size for GCC 4.6+
  (bnc#837258).
	  
- ALSA: hda - Add Toshiba Satellite C870 to MSI blacklist
  (bnc#833585).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092480" comment="kernel-debug-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092481" comment="kernel-debug-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092482" comment="kernel-debug-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092483" comment="kernel-default-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092484" comment="kernel-default-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092485" comment="kernel-default-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092486" comment="kernel-desktop-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092487" comment="kernel-desktop-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092488" comment="kernel-desktop-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092489" comment="kernel-docs-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092490" comment="kernel-ec2-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092491" comment="kernel-ec2-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092492" comment="kernel-ec2-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092493" comment="kernel-pae-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092494" comment="kernel-pae-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092495" comment="kernel-pae-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092496" comment="kernel-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092497" comment="kernel-source-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092498" comment="kernel-source-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092499" comment="kernel-syms-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092500" comment="kernel-trace-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092501" comment="kernel-trace-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092502" comment="kernel-trace-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092503" comment="kernel-vanilla-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092504" comment="kernel-vanilla-devel-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092505" comment="kernel-xen-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092506" comment="kernel-xen-base-3.7.10-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092507" comment="kernel-xen-devel-3.7.10-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:167" version="1" class="patch">
	<metadata>
		<title>update for mozilla-nss</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Mozilla NSS was updated to 3.15.2 (bnc#842979)
* Support for AES-GCM ciphersuites that use the SHA-256 PRF
* MD2, MD4, and MD5 signatures are no longer accepted for OCSP
  or CRLs
* Add PK11_CipherFinal macro
* sizeof() used incorrectly
* nssutil_ReadSecmodDB() leaks memory
* Allow SSL_HandshakeNegotiatedExtension to be called before
  the handshake is finished.
* Deprecate the SSL cipher policy code
* Avoid uninitialized data read in the event of a decryption
  failure. (CVE-2013-1739)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090988" comment="libfreebl3-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090989" comment="libfreebl3-32bit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090990" comment="libsoftokn3-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090991" comment="libsoftokn3-32bit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090992" comment="mozilla-nss-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090993" comment="mozilla-nss-32bit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090994" comment="mozilla-nss-certs-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090995" comment="mozilla-nss-certs-32bit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090996" comment="mozilla-nss-devel-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090997" comment="mozilla-nss-sysinit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090998" comment="mozilla-nss-sysinit-32bit-3.15.2-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090999" comment="mozilla-nss-tools-3.15.2-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:168" version="1" class="patch">
	<metadata>
		<title>rtkit: fixed a race condition in pid checking</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

rtkit was fixed to avoid a TOCTOU race condition that might
have allowed local attackers to gain realtime rights they
should not have. (CVE-2013-4326)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091015" comment="rtkit-0.11_git201205151338-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:169" version="1" class="patch">
	<metadata>
		<title>clutter: fixed a crash after system resume</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

clutter was updatd to fix improper translation of hierarchy events (gnome-shell crash after system
  resume) (CVE-2013-2190, bnc#843441).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091000" comment="clutter-1.12.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091001" comment="clutter-devel-1.12.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091002" comment="clutter-lang-1.12.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091003" comment="libclutter-1_0-0-1.12.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091004" comment="libclutter-1_0-0-32bit-1.12.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091005" comment="typelib-1_0-Clutter-1_0-1.12.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:170" version="1" class="patch">
	<metadata>
		<title>libvirt: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

libvirt was updated to fix security issues and bugs:

Security issues fixed:
CVE-2013-4311: Add support for using 3-arg pkcheck syntax for process to
avoid race conditions.

CVE-2013-4296: Fix a crash (denial of service) in remoteDispatchDomainMemoryStats

CVE-2013-5651: Fix virBitmapParse to avoid access beyond bounds of array (denial of service crash).

Also bugs were fixed:
- nwfilter: check for inverted ctdir. bnc#810611
- Add xencommons as 'Wanted' in the systemd libvirtd service file. bnc#820888
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091032" comment="libvirt-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091033" comment="libvirt-client-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091034" comment="libvirt-client-32bit-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091035" comment="libvirt-devel-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091036" comment="libvirt-devel-32bit-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091037" comment="libvirt-doc-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091038" comment="libvirt-lock-sanlock-1.0.2-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091039" comment="libvirt-python-1.0.2-1.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:171" version="1" class="patch">
	<metadata>
		<title>chromium: 30.0.1599.66 security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Update to Chromium 30.0.1599.66:
  - Easier searching by image 
  - A number of new apps/extension APIs 
  - Lots of under the hood changes for stability and performance
- Security fixes:
  + CVE-2013-2906: Races in Web Audio
  + CVE-2013-2907: Out of bounds read in Window.prototype object
  + CVE-2013-2908: Address bar spoofing related to the 
                   “204 No Content” status code
  + CVE-2013-2909: Use after free in inline-block rendering
  + CVE-2013-2910: Use-after-free in Web Audio
  + CVE-2013-2911: Use-after-free in XSLT
  + CVE-2013-2912: Use-after-free in PPAPI
  + CVE-2013-2913: Use-after-free in XML document parsing
  + CVE-2013-2914: Use after free in the Windows color chooser  
                   dialog
  + CVE-2013-2915: Address bar spoofing via a malformed scheme
  + CVE-2013-2916: Address bar spoofing related to the “204 No 
                   Content” status code
  + CVE-2013-2917: Out of bounds read in Web Audio
  + CVE-2013-2918: Use-after-free in DOM
  + CVE-2013-2919: Memory corruption in V8
  + CVE-2013-2920: Out of bounds read in URL parsing
  + CVE-2013-2921: Use-after-free in resource loader
  + CVE-2013-2922: Use-after-free in template element
  + CVE-2013-2923: Various fixes from internal audits, fuzzing and 
                   other initiatives 
  + CVE-2013-2924: Use-after-free in ICU. Upstream bug

- Add patch chromium-fix-altgrkeys.diff 
   - Make sure that AltGr is treated correctly (issue#296835)

- Do not build with system libxml (bnc#825157)

- Update to Chromium 31.0.1640.0
  * Bug and Stability Fixes
- Fix destkop file for chromium by removing extension from icon
- Change the methodology for the Chromium packages. Build is
   now based on an official tarball. As soon as the Beta channel
   catches up with the current version, Chromium will be 
   based on the Beta channel instead of svn snapshots

- Update to 31.0.1632
  * Bug and Stability fixes
- Added the flag --enable-threaded-compositing to the startup 
  script. This flag seems to be required when hardware acceleration
  is in use. This prevents websites from locking up on users in
  certain cases.

- Update to 31.0.1627
  * Bug and Stability fixes

- Update to 31.0.1619
  * bug and Stability fixes

- require mozilla-nss-devel &amp;gt;= 3.14 and mozilla-nspr-devel &amp;gt;= 4.9.5

- Add patch exclude_ymp.diff to ensure that 1-click-install files 
  are downloaded and NOT opened (bnc#836059)

- Update to 31.0.1611
  * Bug and stability fixes

- Update to 31.0.1605
  * Bug and stability fixes

- Change the startup script so that Chromium will not start 
  when the chrome_sandbox doesn't have the SETUID.
  (bnc#779448)

- Update to 31.0.1601
  * Bug and stability fixes

- Update to 30.0.1594
  * Bug and stability fixes
- Correct specfile to properly own /usr/bin/chromium (bnc#831584)
- Chromium now expects the SUID-helper installed in the same 
  directory as chromium. So let's create a symlink to the helper
  in /usr/lib

- Update to 30.0.1587
  * Bug and stability fixes
- Remove patch chromium-nss-compliant.diff  (Upstream)

- Update to 30.0.1575
  * Bug and stability fixes
  * Enable the gpu-sandbox again due to upstream fix (chromium#255063)

- Update to 30.0.1567
  * bug and Stability fixes
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091057" comment="chromedriver-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091058" comment="chromium-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091059" comment="chromium-desktop-gnome-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091060" comment="chromium-desktop-kde-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091061" comment="chromium-ffmpegsumo-30.0.1599.66-1.11.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091062" comment="chromium-suid-helper-30.0.1599.66-1.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:172" version="1" class="patch">
	<metadata>
		<title>lcms: fixed stack overflow issues in lcms utilities</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Some minor stackoverflows in lcms utilities were fixed. (CVE-2013-4276).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091016" comment="lcms-1.19-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091017" comment="liblcms-devel-1.19-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091018" comment="liblcms-devel-32bit-1.19-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091019" comment="liblcms1-1.19-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091020" comment="liblcms1-32bit-1.19-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091021" comment="python-lcms-1.19-11.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:173" version="1" class="patch">
	<metadata>
		<title>gpg2: fixed a denial of service attack</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

gpg2 was updated to fix a denial of service attack through infinite
recursion in the compressed packet parser [bnc#844175] [CVE-2013-4402].
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091022" comment="gpg2-2.0.19-5.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091023" comment="gpg2-lang-2.0.19-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:174" version="1" class="patch">
	<metadata>
		<title>proftpd: security and bugfix update to 1.3.4d</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

proftpd was updated to 1.3.4d.
  * Fixed broken build when using --disable-ipv6 configure option
  * Fixed mod_sql &amp;quot;SQLAuthType Backend&amp;quot; MySQL issues
- fix for bnc#843444 (CVE-2013-4359)
  * http://bugs.proftpd.org/show_bug.cgi?id=3973
  * add proftpd-sftp-kbdint-max-responses-bug3973.patch

- Improve systemd service file 
- use upstream tmpfiles.d file. related to [bnc#811793]
- Use /run instead of /var/run 

- update to 1.3.4c
  * Added Spanish translation.
  * Fixed several mod_sftp issues, including SFTPPassPhraseProvider,
    handling of symlinks for REALPATH requests, and response code logging.
  * Fixed symlink race for creating directories when UserOwner is in effect.
  * Increased performance of FTP directory listings.
- rebase and rename patches (remove version string)
  * proftpd-1.3.4a-dist.patch -&amp;gt; proftpd-dist.patch
  * proftpd-1.3.4a-ftpasswd.patch -&amp;gt; proftpd-ftpasswd.patch
  * proftpd-1.3.4a-strip.patch -&amp;gt; proftpd-strip.patch

- fix proftpd.conf (rebase basic.conf patch)
  * IdentLookups is now a seperate module
    &amp;lt;IfModule mod_ident.c&amp;gt; IdentLookups on/off &amp;lt;/IfModule&amp;gt;
    is needed and module is not built cause crrodriguez disabled it.

- fix for bnc#787884
   (https://bugzilla.novell.com/show_bug.cgi?id=787884)
  * added extra Source proftpd.conf.tmpfile

- Disable ident lookups, this protocol is totally obsolete
 and dangerous. (add --disable-ident)
- Fix debug info generation ( add --disable-strip) 

- Add systemd unit 

- update to 1.3.4b
  + Fixed mod_ldap segfault on login when LDAPUsers with no filters used.
  + Fixed sporadic SFTP upload issues for large files.
  + Fixed SSH2 handling for some clients (e.g. OpenVMS).
  + New FactsOptions directive; see doc/modules/mod_facts.html#FactsOptions
  + Fixed build errors on Tru64, AIX, Cygwin.
- add Source Signatuire (.asc) file
- add noBuildDate patch
- add lang pkg
  * --enable-nls
- add configure option
  * --enable-openssl, --with-lastlog
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091088" comment="proftpd-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091089" comment="proftpd-devel-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091090" comment="proftpd-doc-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091091" comment="proftpd-lang-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091092" comment="proftpd-ldap-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091093" comment="proftpd-mysql-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091094" comment="proftpd-pgsql-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091095" comment="proftpd-radius-1.3.4d-4.4.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091096" comment="proftpd-sqlite-1.3.4d-4.4.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:175" version="1" class="patch">
	<metadata>
		<title>spice-gtk: fixed race condition in pid checking</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
spice-gtk received fixes for the acl helper policy kit checks
  that had a race condition in PID checking. (CVE-2013-4324, bnc#844967).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091097" comment="libspice-client-glib-2_0-8-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091098" comment="libspice-client-gtk-2_0-4-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091099" comment="libspice-client-gtk-3_0-4-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091100" comment="libspice-controller0-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091101" comment="python-SpiceClientGtk-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091102" comment="spice-gtk-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091103" comment="spice-gtk-devel-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091104" comment="spice-gtk-lang-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091105" comment="typelib-1_0-SpiceClientGlib-2_0-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091106" comment="typelib-1_0-SpiceClientGtk-2_0-0.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091107" comment="typelib-1_0-SpiceClientGtk-3_0-0.14-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:176" version="1" class="patch">
	<metadata>
		<title>nmap: fixed http-domino-enum-passwords script</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

nmap was updated to fix the http-domino-enum-passwords scripts.
If you ran the (fortunately non-default) http-domino-enum-passwords script
with the (fortunately also non-default) domino-enum-passwords.idpath
parameter against a malicious server, it could cause an arbitrarily named
file to to be written to the client system.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091063" comment="ncat-6.25-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091064" comment="ndiff-6.25-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091065" comment="nmap-6.25-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091066" comment="nping-6.25-3.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091067" comment="zenmap-6.25-3.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:177" version="1" class="patch">
	<metadata>
		<title>update for jakarta-commons-fileupload</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

	A remote attacker could supply a serialized instance of the DiskFileItem class, which would be deserialized on a server and write arbitrary content to any location on the server that is permitted by the user running the application server process.   bnc#846174/CVE-2013-2186
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091110" comment="jakarta-commons-fileupload-1.1.1-114.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091111" comment="jakarta-commons-fileupload-javadoc-1.1.1-114.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:178" version="1" class="patch">
	<metadata>
		<title>libzrtpcpp: fixed multiple security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
libzrtpcpp was updated to fix multiple security issues.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091122" comment="libzrtpcpp-2.0.0-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091123" comment="libzrtpcpp-devel-2.0.0-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091124" comment="libzrtpcpp2-2.0.0-8.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:179" version="1" class="patch">
	<metadata>
		<title>update for dropbear</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
 dropbear was updated to version 2013.60 to fix following bugs:
  * Fix &amp;quot;make install&amp;quot; so that it doesn't always install to /bin and /sbin
  * Fix &amp;quot;make install MULTI=1&amp;quot;, installing manpages failed
  * Fix &amp;quot;make install&amp;quot; when scp is included since it has no manpage
  * Make --disable-bundled-libtom work
- used as bug fix release for bnc#845306 - VUL-0: CVE-2013-4421 and CVE-2013-4434

- provided links for download sources
- employed gpg-offline - verify sources 

- imported upstream version 2013.59
  * Fix crash from -J command 
    Thanks to Llu??s Batlle i Rossell and Arnaud Mouiche for patches
  * Avoid reading too much from /proc/net/rt_cache since that causes
    system slowness. 
  * Improve EOF handling for half-closed connections
    Thanks to Catalin Patulea
  * Send a banner message to report PAM error messages intended for the user
    Patch from Martin Donnelly
  * Limit the size of decompressed payloads, avoids memory exhaustion denial
    of service 
    Thanks to Logan Lamb for reporting and investigating it
  * Avoid disclosing existence of valid users through inconsistent delays
    Thanks to Logan Lamb for reporting
  * Update config.guess and config.sub for newer architectures
  * Avoid segfault in server for locked accounts
  * &amp;quot;make install&amp;quot; now installs manpages
    dropbearkey.8 has been renamed to dropbearkey.1
    manpage added for dropbearconvert
  * Get rid of one second delay when running non-interactive commands 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091147" comment="dropbear-2013.60-7.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:180" version="1" class="patch">
	<metadata>
		<title>update for ruby19</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
ruby19 was updated to fix the following security issues:
- fix CVE-2013-2065: Object taint bypassing in DL and Fiddle (bnc#843686)
  The file CVE-2013-2065.patch contains the patch
- fix CVE-2013-4287 CVE-2013-4363: ruby19: Algorithmic complexity vulnerability  (bnc#837457)
  The file CVE-2013-4287-4363.patch contains the patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091135" comment="ruby19-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091136" comment="ruby19-devel-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091137" comment="ruby19-devel-extra-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091138" comment="ruby19-doc-ri-1.9.3.p392-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091139" comment="ruby19-tk-1.9.3.p392-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:181" version="1" class="patch">
	<metadata>
		<title>update for xorg-x11-server</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
 Fixes the following security issue: 
- an authenticated X client
    can cause an X server to use memory after it was freed, 
    potentially leading to crash and/or memory corruption.
    (CVE-2013-4396, bnc#843652)
and the following bug was fixed too:
- rfbAuthReenable is accessing rfbClient structure that was in
    most cases already freed. It actually needs only ScreenPtr, 
    so pass it directly. (bnc#816813)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091140" comment="xorg-x11-server-7.6_1.13.2-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091141" comment="xorg-x11-server-extra-7.6_1.13.2-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091142" comment="xorg-x11-server-sdk-7.6_1.13.2-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:182" version="1" class="patch">
	<metadata>
		<title>update for apache2-mod_fcgid</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
the following security issue was fixed in apache2-mod_fcgid:
  - fixes a heap overflow identified by CVE-2013-4365 [bnc#844935].
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091143" comment="apache2-mod_fcgid-2.3.6-11.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:183" version="1" class="patch">
	<metadata>
		<title>update for hplip</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
the following security issue was fixed for HPLIP 3.13.10:
  usage of an insecure polkit DBUS API (fix for bnc#836937 and CVE-2013-4325 that are related to CVE-2013-4288 and bnc#835827).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091148" comment="hplip-3.12.11-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091149" comment="hplip-hpijs-3.12.11-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091150" comment="hplip-sane-3.12.11-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:184" version="1" class="patch">
	<metadata>
		<title>update for java-1_7_0-openjdk</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Update to icedtea 2.4.3 (bnc#846999) synchronized OpenJDK 7 support with the upstream u45 b31 fixes the following issues:

  - S8006900, CVE-2013-3829: Add new date/time capability
  - S8008589: Better MBean permission validation
  - S8011071, CVE-2013-5780: Better crypto provider handling
  - S8011081, CVE-2013-5772: Improve jhat
  - S8011157, CVE-2013-5814: Improve CORBA portablility
  - S8012071, CVE-2013-5790: Better Building of Beans
  - S8012147: Improve tool support
  - S8012277: CVE-2013-5849: Improve AWT DataFlavor
  - S8012425, CVE-2013-5802: Transform TransformerFactory
  - S8013503, CVE-2013-5851: Improve stream factories
  - S8013506: Better Pack200 data handling
  - S8013510, CVE-2013-5809: Augment image writing code
  - S8013514: Improve stability of cmap class
  - S8013739, CVE-2013-5817: Better LDAP resource management
  - S8013744, CVE-2013-5783: Better tabling for AWT
  - S8014085: Better serialization support in JMX classes
  - S8014093, CVE-2013-5782: Improve parsing of images
  - S8014098: Better profile validation
  - S8014102, CVE-2013-5778: Improve image conversion
  - S8014341, CVE-2013-5803: Better service from Kerberos servers
  - S8014349, CVE-2013-5840: (cl) Class.getDeclaredClass problematic in some class loader configurations
  - S8014530, CVE-2013-5825: Better digital signature processing
  - S8014534: Better profiling support
  - S8014987, CVE-2013-5842: Augment serialization handling
  - S8015614: Update build settings
  - S8015731: Subject java.security.auth.subject to improvements
  - S8015743, CVE-2013-5774: Address internet addresses
  - S8016256: Make finalization final
  - S8016653, CVE-2013-5804: javadoc should ignore ignoreable characters in names
  - S8016675, CVE-2013-5797: Make Javadoc pages more robust
  - S8017196, CVE-2013-5850: Ensure Proxies are handled appropriately
  - S8017287, CVE-2013-5829: Better resource disposal
  - S8017291, CVE-2013-5830: Cast Proxies Aside
  - S8017298, CVE-2013-4002: Better XML support
  - S8017300, CVE-2013-5784: Improve Interface Implementation
  - S8017505, CVE-2013-5820: Better Client Service
  - S8019292: Better Attribute Value Exceptions
  - S8019617: Better view of objects
  - S8020293: JVM crash
  - S8021275, CVE-2013-5805: Better screening for ScreenMenu
  - S8021282, CVE-2013-5806: Better recycling of object instances
  - S8021286: Improve MacOS resourcing
  - S8021290, CVE-2013-5823: Better signature validation
  - S8022931, CVE-2013-5800: Enhance Kerberos exceptions
  - S8022940: Enhance CORBA translations
  - S8023683: Enhance class file parsing
* Backports
  - S6614237: missing codepage Cp290 at java runtime
  - S8005932: Java 7 on mac os x only provides text clipboard formats
  - S8014046: (process) Runtime.exec(String) fails if command contains spaces [win]
  - S8015144: Performance regression in ICU OpenType Layout library
  - S8015965: (process) Typo in name of property to allow ambiguous commands
  - S8015978: Incorrect transformation of XPath expression &amp;quot;string(-0)&amp;quot;
  - S8016357: Update hotspot diagnostic class
  - S8019584: javax/management/remote/mandatory/loading/MissingClassTest.java failed in nightly against jdk7u45: java.io.InvalidObjectException: Invalid notification: null
  - S8019969: nioNetworkChannelInet6/SetOptionGetOptionTestInet6 test case crashes
  - S8020032: 7u fastdebug doesn't generate fastdebuginfo file
  - S8020085: Linux ARM build failure for 7u45
  - S8020088: Increment minor version of HSx for 7u45 and initialize the build number
  - S8020551: increment hsx build to b03 for 7u45-b03
  - S8020943: Memory leak when GCNotifier uses create_from_platform_dependent_str()
  - S8021287: Improve MacOS resourcing
  - S8021355: REGRESSION: Five closed/java/awt/SplashScreen tests fail since 7u45 b01 on Linux, Solaris
  - S8021360: object not exported&amp;quot; on start of JMXConnectorServer for RMI-IIOP protocol with security manager
  - S8021366: java_util/Properties/PropertiesWithOtherEncodings fails during 7u45 nightly testing
  - S8021577: JCK test api/javax_management/jmx_serial/modelmbean/ModelMBeanNotificationInfo/serial/index.html#Input has failed since jdk 7u45 b01
  - S8021899: Re-adjust fix of # 8020498 in 7u45 after mergeing 7u40
  - S8021901: Increment hsx build to b05 for 7u45-b05
  - S8021933: Add extra check for fix # JDK-8014530
  - S8021969: The index_AccessAllowed jnlp can not load successfully with exception thrown in the log.
  - S8022066: Evaluation of method reference to signature polymorphic method crashes VM
  - S8022086: Fixing licence of newly added files
  - S8022254: Remove incorrect jdk7u45-b05 tag from jdk7u-cpu forest
  - S8022661: InetAddress.writeObject() performs flush() on object output stream
  - S8022682: Supporting XOM
  - S8022808: Kitchensink hangs on macos
  - S8022856: 7u45 l10n resource file translation update
  - S8023323: Increment hsx build to b06 for 7u45-b08
  - S8023457: Event based tracing framework needs a mutex for thread groups
  - S8023478: Test fails with HS crash in GCNotifier.
  - S8023741: Increment hsx 24.45 build to b07 for 7u45-b09
  - S8023771: when USER_RELEASE_SUFFIX is set in order to add a string to java -version, build number in the bundles names should not be changed to b00
  - S8023888: Increment hsx 24.45 build to b08 for 7u45-b10
  - S8023964: java/io/IOException/LastErrorString.java should be @ignore-d
  - S8024369: Increment build # of hs24.0 to b57 for 7u40-b61 psu
  - S8024668: api/java_nio/charset/Charset/index.html#Methods JCK-runtime test fails with 7u45 b11
  - S8024697: Fix for 8020983 causes Xcheck:jni warnings
  - S8024863: X11: Support GNOME Shell as mutter
  - S8024883: (se) SelectableChannel.register throws NPE if fd &amp;gt;= 64k (lnx)
  - S8025128: File.createTempFile fails if prefix is absolute path
  - S8025170: jdk7u51 7u-1-prebuild is failing since 9/19
* Bug fixes
  - PR1400: Menu of maximized AWT window not working in Mate

- Update to icedtea 2.4.2 
* System LCMS 2 support again enabled by default, requiring 2.5 or above.
* OpenJDK
  - S7122222: GC log is limited to 2G for 32-bit
  - S7162400: Intermittent java.io.IOException: Bad file number during HotSpotVirtualMachine.executeCommand
  - S7165807: Non optimized initialization of NSS crypto library leads to scalability issues
  - S7199324: IPv6: JMXConnectorServer.getConnectionIDs() return IDs contradicting to address grammar
  - S8001345: VM crashes with assert(n-&amp;gt;outcnt() != 0 || C-&amp;gt;top() == n || n-&amp;gt;is_Proj()) failed: No dead instructions after post-alloc
  - S8001424: G1: Rename certain G1-specific flags
  - S8001425: G1: Change the default values for certain G1 specific flags
  - S8004859: Graphics.getClipBounds/getClip return difference nonequivalent bounds, depending from transform
  - S8005019: JTable passes row index instead of length when inserts selection interval
  - S8005194: [parfait] #353 sun/awt/image/jpeg/imageioJPEG.c Memory leak of pointer 'scale' allocated with calloc()
  - S8006941: [macosx] Deadlock in drag and drop
  - S8007898: Incorrect optimization of Memory Barriers in Matcher::post_store_load_barrier()
  - S8009168: accessibility.properties syntax issue
  - S8009985: [parfait] Uninitialised variable at jdk/src/solaris/native/com/sun/management/UnixOperatingSystem_md.c
  - S8011064: Some tests have failed with SIGSEGV on arm-hflt on build b82
  - S8011569: ARM -- avoid native stack walking
  - S8011760: assert(delta != 0) failed: dup pointer in MemBaseline::malloc_sort_by_addr
  - S8012144: multiple SIGSEGVs fails on staxf
  - S8012156: tools/javac/file/zip/T6865530.java fails for win32/64
  - S8012241: NMT huge memory footprint, it usually leads to OOME
  - S8012366: Fix for 8007815 breaks down when only building OpenJDK (without deploy and install forests)
  - S8013546: compiler/8011901/Test8011901.java fails with CompilationError: Compilation failed
  - S8013719: Increment build # of hs23.21 to b02
  - S8013791: G1: G1CollectorPolicy::initialize_flags() may set min_alignment &amp;gt; max_alignment
  - S8014264: The applet pathguy_TimeDead throws java.lang.NullPointerException in java console once click drop-down check box.
  - S8014312: Fork hs23.25 hsx from hs23.21 for jdk7u25 and reinitialize build number
  - S8014805: NPE is thrown during certpath validation if certificate does not have AuthorityKeyIdentifier extension
  - S8014850: Third Party License Readme updates for 7u40
  - S8014925: Disable sun.reflect.Reflection.getCallerClass(int) with a temporary switch to re-enable it
  - S8015237: Parallelize string table scanning during strong root processing
  - S8015411: Bump the hsx build number for 7u21-b50 for customer
  - S8015441: runThese crashed with assert(opcode == Op_ConP || opcode == Op_ThreadLocal || opcode == Op_CastX2P ..) failed: sanity
  - S8015576: CMS: svc agent throws java.lang.RuntimeException: No type named &amp;quot;FreeList&amp;quot; in database
  - S8015668: overload resolution: performance regression in JDK 7
  - S8015884: runThese crashed with SIGSEGV, hs_err has an error instead of stacktrace
  - S8016074: NMT: assertion failed: assert(thread-&amp;gt;thread_state() == from) failed: coming from wrong thread state
  - S8016102: Increment build # of hs23.25 to b02 for 7u25-b31 psu
  - S8016131: nsk/sysdict/vm/stress/chain tests crash the VM in 'entry_frame_is_first()'
  - S8016133: Regression: diff. behavior with user-defined SAXParser
  - S8016157: During CTW: C2: assert(!def_outside-&amp;gt;member(r)) failed: Use of external LRG overlaps the same LRG defined in this block
  - S8016331: Minor issues in event tracing metadata
  - S8016648: FEATURE_SECURE_PROCESSING set to true or false causes SAXParseException to be thrown
  - S8016734: Remove extra code due to duplicated push
  - S8016737: After clicking on &amp;quot;Print UNCOLLATED&amp;quot; button, the print out come in order 'Page 1', 'Page 2', 'Page 1'
  - S8016740: assert in GC_locker from PSOldGen::expand with -XX:+PrintGCDetails and Verbose
  - S8016767: Provide man pages generated from DARB for OpenJDK
  - S8017070: G1: assert(_card_counts[card_num] &amp;lt;= G1ConcRSHotCardLimit) failed
  - S8017159: Unexclude sun/tools/JMAP/Basic.sh test
  - S8017173: XMLCipher with RSA_OAEP Key Transport algorithm can't be instantiated
  - S8017174: NPE when using Logger.getAnonymousLogger or LogManager.getLogManager().getLogger
  - S8017189: [macosx] AWT program menu disabled on Mac
  - S8017252: new hotspot build - hs24-b51
  - S8017478: Kitchensink crashed with SIGSEGV in BaselineReporter::diff_callsites
  - S8017483: G1 tests fail with native OOME on Solaris x86 after HeapBaseMinAddress has been increased
  - S8017510: Add a regression test for 8005956
  - S8017566: Backout 8000450 - Cannot access to com.sun.corba.se.impl.orb.ORBImpl
  - S8017588: SA: jstack -l throws UnalignedAddressException while attaching to core file for java that was started with CMS GC
  - S8019155: Update makefiles with correct jfr packages
  - S8019201: Regression: java.awt.image.ConvolveOp throws java.awt.image.ImagingOpException
  - S8019236: [macosx] Add javadoc to the handleWindowFocusEvent in CEmbeddedFrame
  - S8019265: [macosx] apple.laf.useScreenMenuBar regression comparing with jdk6
  - S8019298: new hotspot build - hs24-b52
  - S8019381: HashMap.isEmpty is non-final, potential issues for get/remove
  - S8019541: 7u40 l10n resource file translation update
  - S8019587: [macosx] Possibility to set the same frame for the different screens
  - S8019625: Test compiler/8005956/PolynomialRoot.java timeouts on Solaris SPARCs
  - S8019628: [macosx] closed/java/awt/Modal/BlockedMouseInputTest/BlockedMouseInputTest.html failed since 7u40b30 on MacOS
  - S8019826: Test com/sun/management/HotSpotDiagnosticMXBean/SetVMOption.java fails with NPE
  - S8019933: new hotspot build - hs24-b53
  - S8019979: Replace CheckPackageAccess test with better one from closed repo
  - S8020038: [macosx] Incorrect usage of invokeLater() and likes in callbacks called via JNI from AppKit thread
  - S8020054: (tz) Support tzdata2013d
  - S8020155: PSR:PERF G1 not collecting old regions when humongous allocations interfer
  - S8020215: Different execution plan when using JIT vs interpreter
  - S8020228: Restore the translated version of logging_xx.properties
  - S8020298: [macosx] Incorrect merge in the lwawt code
  - S8020319: Update Japanese man pages for 7u40
  - S8020371: [macosx] applets with Drag and Drop fail with IllegalArgumentException
  - S8020381: new hotspot build - hs24-b54
  - S8020425: Product options incorrectly removed in minor version
  - S8020430: NullPointerException in xml sqe nightly result on 2013-07-12
  - S8020433: Crash when using -XX:+RestoreMXCSROnJNICalls
  - S8020498: Crash when both libnet.so and libmawt.so are loaded
  - S8020525: Increment build # of hs23.25 to b03 for 7u25-b34 psu
  - S8020547: Event based tracing needs a UNICODE string type
  - S8020625: [TESTBUG] java/util/HashMap/OverrideIsEmpty.java doesn't compile for jdk7u
  - S8020701: Avoid crashes in WatcherThread
  - S8020796: new hotspot build - hs24-b55
  - S8020811: [macosx] Merge fault 7u25-7u40: Missed focus fix JDK-8012330
  - S8020940: Valid OCSP responses are rejected for backdated enquiries
  - S8020983: OutOfMemoryError caused by non garbage collected JPEGImageWriter Instances
  - S8021008: Provide java and jcmd man pages for Mac (OpenJDK)
  - S8021148: Regression in SAXParserImpl in 7u40 b34 (NPE)
  - S8021353: Event based tracing is missing thread exit
  - S8021381: JavaFX scene included in Swing JDialog not starting from Web Start
  - S8021565: new hotspot build - hs24-b56
  - S8021771: warning stat64 is deprecated - when building on OSX 10.7.5
  - S8021946: Disabling sun.reflect.Reflection.getCallerCaller(int) by default breaks several frameworks and libraries
  - S8022548: SPECJVM2008 has errors introduced in 7u40-b34
  - S8023751: Need to backout 8020943, was pushed to hs24 without approval
  - S8024914: Swapped usage of idx_t and bm_word_t types in bitMap.inline.hpp
* New features
  - RH991170: java does not use correct kerberos credential cache
  - PR1536: Allow use of system Kerberos to obtain cache location
  - PR1551: Add build support for Zero AArch64
  - PR1552: Add -D_LITTLE_ENDIAN for ARM architectures.
  - PR1553: Add Debian AArch64 support
  - PR1554: Fix build on Mac OS X
* Bug fixes
  - RH661505: JPEGs with sRGB IEC61966-2.1 color profiles have wrong colors
  - RH995488: Java thinks that the default timezone is Busingen instead of Zurich
  - Cleanup file resources properly in TimeZone_md.
  - PR1410: Icedtea 2.3.9 fails to build using icedtea 1.12.4
  - G477456: emerge fails on pax system: java attempts RWX map, paxctl -m missing
  - G478484: patches/boot/ecj-diamond.patch FAILED
  - Fix Zero following changes to entry_frame_call_wrapper in 8016131
  - Set ZERO_BUILD in flags.make so it is set on rebuilds
  - Cast should use same type as GCDrainStackTargetSize (uintx).
  - Add casts to fix build on S390
* JamVM
  - JSR292: Invoke Dynamic
  - sun.misc.Unsafe: additional methods get/putAddress: allows JamVM with OpenJDK 7/8 to run recent versions of JEdit.
  - FreeClassData: adjust method count for Miranda methods
* Patches changes (mostly sync with Fedora)
  * removed java-1.7.0-openjdk-arm-fixes.patch, fixed upstream
  * removed java-1.7.0-openjdk-fork.patch, fixed upstream
  * renamed java-1.7.0-openjdk-bitmap.patch to zero-s8024914.patch
  * renamed java-1.7.0-openjdk-size_t.patch to zero-size_t.patch
  * added PStack-808293.patch
  * added RH661505-toBeReverted.patch
  * added abrt_friendly_hs_log_jdk7.patch
  * added gstackbounds.patch
  * added java-1.7.0-openjdk-freetype-check-fix.patch
  * added pulse-soundproperties.patch
  * added rhino.patch
  * added zero-entry_frame_call_wrapper.patch
  * added zero-gcdrainstacktargetsize.patch
  * added zero-zero_build.patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091348" comment="java-1_7_0-openjdk-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091349" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091350" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091351" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.24.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091352" comment="java-1_7_0-openjdk-src-1.7.0.6-8.24.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:185" version="1" class="patch">
	<metadata>
		<title></title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Empty.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091252" comment="libmodplug-0.8.8.4-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091253" comment="libmodplug-devel-0.8.8.4-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091254" comment="libmodplug1-0.8.8.4-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091255" comment="libmodplug1-32bit-0.8.8.4-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:186" version="1" class="patch">
	<metadata>
		<title>openssl: disable compression</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This update disables compression in openssl by default, as
the varying sizes resulting from compression can be used to
retrieve plaintext in various cases. (CRIME attack CVE-2012-4929).

This update introduces a environment variable 
OPENSSL_NO_DEFAULT_ZLIB
which can be set to &amp;quot;no&amp;quot; to reenable compression in selected
services.
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091207" comment="libopenssl-devel-1.0.1e-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091208" comment="libopenssl-devel-32bit-1.0.1e-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091209" comment="libopenssl1_0_0-1.0.1e-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091210" comment="libopenssl1_0_0-32bit-1.0.1e-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091211" comment="openssl-1.0.1e-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091212" comment="openssl-doc-1.0.1e-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:187" version="1" class="patch">
	<metadata>
		<title>xen: security and bugfix update to 4.2.3</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Xen was updated to 4.2.3 c/s 26170 to fix various bugs and security issues.


Following issues were fixed:
- bnc#845520 - CVE-2013-4416: xen: ocaml xenstored mishandles oversized message replies
- bnc#833483 - Boot Failure with xen kernel in UEFI mode with error
  &amp;quot;No memory for trampoline&amp;quot;

- Improvements to block-dmmd script bnc#828623

- bnc#840196 - MTU size on Dom0 gets reset when booting DomU with e1000 device

- bnc#840592 - CVE-2013-4355: XSA-63: xen: Information leaks through I/O instruction emulation
- bnc#841766 - CVE-2013-4361: XSA-66: xen: Information leak through fbld instruction emulation
- bnc#842511 - CVE-2013-4368: XSA-67: xen: Information leak through outs instruction emulation
- bnc#842512 - CVE-2013-4369: XSA-68: xen: possible null dereference when parsing vif ratelimiting info
- bnc#842513 - CVE-2013-4370: XSA-69: xen: misplaced free in ocaml xc_vcpu_getaffinity stub
- bnc#842514 - CVE-2013-4371: XSA-70: xen: use-after-free in libxl_list_cpupool under memory pressure
- bnc#842515 - CVE-2013-4375: XSA-71: xen: qemu disk backend (qdisk) resource leak

- bnc#839596 - CVE-2013-1442: XSA-62: xen: Information leak on AVX and/or LWP capable CPUs
- bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform
  and with xen environment, in booting stage ,xen hypervisor will
  panic.
- bnc#833796 - Xen: migration broken from xsave-capable to xsave-incapable host
- bnc#834751 - [HP BCS SLES11 Bug]: In xen, “shutdown –y 0 –h”
  cannot power off system
- bnc#839600 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform and
  sles11sp3 with xen environment, xen hypervisor will panic on
  multiple blades nPar.  

- bnc#833251 - [HP BCS SLES11 Bug]: In HP’s UEFI x86_64 platform
  and with xen environment, in booting stage ,xen hypervisor will
  panic.
- bnc#835896 - vcpus not started after upgrading Dom0 from 11SP2 to
  SP3
- bnc#836239 - SLES 11 SP3 Xen security patch does not
  automatically update UEFI boot binary
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092255" comment="xen-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092256" comment="xen-devel-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092257" comment="xen-kmp-default-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092258" comment="xen-kmp-desktop-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092259" comment="xen-kmp-pae-4.2.3_01_k3.7.10_1.16-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092260" comment="xen-libs-32bit-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092261" comment="xen-libs-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092262" comment="xen-tools-domU-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092263" comment="xen-doc-html-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092264" comment="xen-doc-pdf-4.2.3_01-1.22.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092265" comment="xen-tools-4.2.3_01-1.22.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:188" version="1" class="patch">
	<metadata>
		<title>Mozilla Suite: Update to October 2013 release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

MozillaFirefox was updated to Firefox 25.0.
MozillaThunderbird was updated to Thunderbird 24.1.0.
Mozilla XULRunner was updated to 17.0.10esr.
Mozilla NSPR was updated to 4.10.1.

Changes in MozillaFirefox:
  * requires NSS 3.15.2 or above
  * MFSA 2013-93/CVE-2013-5590/CVE-2013-5591/CVE-2013-5592
    Miscellaneous memory safety hazards
  * MFSA 2013-94/CVE-2013-5593 (bmo#868327)
    Spoofing addressbar through SELECT element
  * MFSA 2013-95/CVE-2013-5604 (bmo#914017)
    Access violation with XSLT and uninitialized data
  * MFSA 2013-96/CVE-2013-5595 (bmo#916580)
    Improperly initialized memory and overflows in some JavaScript
    functions
  * MFSA 2013-97/CVE-2013-5596 (bmo#910881)
    Writing to cycle collected object during image decoding
  * MFSA 2013-98/CVE-2013-5597 (bmo#918864)
    Use-after-free when updating offline cache
  * MFSA 2013-99/CVE-2013-5598 (bmo#920515)
    Security bypass of PDF.js checks using iframes
  * MFSA 2013-100/CVE-2013-5599/CVE-2013-5600/CVE-2013-5601
    (bmo#915210, bmo#915576, bmo#916685)
    Miscellaneous use-after-free issues found through ASAN fuzzing
  * MFSA 2013-101/CVE-2013-5602 (bmo#897678)
    Memory corruption in workers
  * MFSA 2013-102/CVE-2013-5603 (bmo#916404)
    Use-after-free in HTML document templates

Changes in MozillaThunderbird:
  * requires NSS 3.15.2 or above
  * MFSA 2013-93/CVE-2013-5590/CVE-2013-5591/CVE-2013-5592
    Miscellaneous memory safety hazards
  * MFSA 2013-94/CVE-2013-5593 (bmo#868327)
    Spoofing addressbar through SELECT element
  * MFSA 2013-95/CVE-2013-5604 (bmo#914017)
    Access violation with XSLT and uninitialized data
  * MFSA 2013-96/CVE-2013-5595 (bmo#916580)
    Improperly initialized memory and overflows in some JavaScript
    functions
  * MFSA 2013-97/CVE-2013-5596 (bmo#910881)
    Writing to cycle collected object during image decoding
  * MFSA 2013-98/CVE-2013-5597 (bmo#918864)
    Use-after-free when updating offline cache
  * MFSA 2013-100/CVE-2013-5599/CVE-2013-5600/CVE-2013-5601
    (bmo#915210, bmo#915576, bmo#916685)
    Miscellaneous use-after-free issues found through ASAN fuzzing
  * MFSA 2013-101/CVE-2013-5602 (bmo#897678)
    Memory corruption in workers
  * MFSA 2013-102/CVE-2013-5603 (bmo#916404)
    Use-after-free in HTML document templates

- update to Thunderbird 24.0.1
  * fqdn for smtp server name was not accepted (bmo#913785)
  * fixed crash in PL_strncasecmp (bmo#917955)
- update Enigmail to 1.6
  * The passphrase timeout configuration in Enigmail is now read and
    written from/to gpg-agent.
  * New dialog to change the expiry date of keys
  * New function to search for the OpenPGP keys of all Address Book
    entries on a keyserver
  * removed obsolete enigmail-build.patch

Changes in xulrunner:
- update to 17.0.10esr (bnc#847708)
  * require NSS 3.14.4 or above
  * MFSA 2013-93/CVE-2013-5590/CVE-2013-5591/CVE-2013-5592
    Miscellaneous memory safety hazards
  * MFSA 2013-95/CVE-2013-5604 (bmo#914017)
    Access violation with XSLT and uninitialized data
  * MFSA 2013-96/CVE-2013-5595 (bmo#916580)
    Improperly initialized memory and overflows in some JavaScript
    functions
  * MFSA 2013-98/CVE-2013-5597 (bmo#918864)
    Use-after-free when updating offline cache
  * MFSA 2013-100/CVE-2013-5599/CVE-2013-5600/CVE-2013-5601
    (bmo#915210, bmo#915576, bmo#916685)
    Miscellaneous use-after-free issues found through ASAN fuzzing
  * MFSA 2013-101/CVE-2013-5602 (bmo#897678)
    Memory corruption in workers

- update to 17.0.9esr (bnc#840485)
  * MFSA 2013-65/CVE-2013-1705 (bmo#882865)
    Buffer underflow when generating CRMF requests
  * MFSA 2013-76/CVE-2013-1718
    Miscellaneous memory safety hazards
  * MFSA 2013-79/CVE-2013-1722 (bmo#893308)
    Use-after-free in Animation Manager during stylesheet cloning
  * MFSA 2013-82/CVE-2013-1725 (bmo#876762)
    Calling scope for new Javascript objects can lead to memory corruption
  * MFSA 2013-88/CVE-2013-1730 (bmo#851353)
    Compartment mismatch re-attaching XBL-backed nodes
  * MFSA 2013-89/CVE-2013-1732 (bmo#883514)
    Buffer overflow with multi-column, lists, and floats
  * MFSA 2013-90/CVE-2013-1735/CVE-2013-1736 (bmo#898871, bmo#906301)
    Memory corruption involving scrolling
  * MFSA 2013-91/CVE-2013-1737 (bmo#907727)
    User-defined properties on DOM proxies get the wrong &amp;quot;this&amp;quot; object

Changes in mozilla-nspr:
- update to version 4.10.1
  * bmo#888273: RWIN Scaling (RFC1323) limited to 2 on Windows 7 and 8
                (Windows only)
  * bmo#907512: Unix platforms shouldn't mask errors specific to
                Unix domain sockets
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091256" comment="MozillaFirefox-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091257" comment="MozillaFirefox-branding-upstream-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091258" comment="MozillaFirefox-buildsymbols-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091259" comment="MozillaFirefox-devel-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091260" comment="MozillaFirefox-translations-common-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091261" comment="MozillaFirefox-translations-other-25.0-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091262" comment="MozillaThunderbird-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091263" comment="MozillaThunderbird-buildsymbols-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091264" comment="MozillaThunderbird-devel-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091265" comment="MozillaThunderbird-translations-common-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091266" comment="MozillaThunderbird-translations-other-24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091267" comment="enigmail-1.6.0+24.1.0-61.31.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091268" comment="mozilla-nspr-32bit-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091269" comment="mozilla-nspr-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091270" comment="mozilla-nspr-devel-4.10.1-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091271" comment="mozilla-js-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091272" comment="mozilla-js-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091273" comment="xulrunner-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091274" comment="xulrunner-32bit-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091275" comment="xulrunner-buildsymbols-17.0.10-1.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091276" comment="xulrunner-devel-17.0.10-1.30.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:189" version="1" class="patch">
	<metadata>
		<title>update for python-pyOpenSSL</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
update to 0.13.1 fixes the following security issue:
		 NUL byte handling in subjectAltName (bnc#839107, CVE-2013-4314)
	       CVE-2013-4314
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091315" comment="python-pyOpenSSL-doc-0.13.1-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091316" comment="python-pyOpenSSL-0.13.1-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:190" version="1" class="patch">
	<metadata>
		<title>update for openvpn</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
The following security issues were fixed:
- Applied upstream patch changing to use a constant time memcmp
  when comparing HMACs in openvpn_decrypt to address ciphertext
  injection in UDP mode (CVE-2013-2061, bnc#843509).
  [0006-openvpn-2.0.9-HMAC-memcmp-CVE-2013-2061_bnc843509.patch]

Changes in openvpn:
- Applied upstream patch changing to use a constant time memcmp
  when comparing HMACs in openvpn_decrypt to address ciphertext
  injection in UDP mode (CVE-2013-2061, bnc#843509).
  [0006-openvpn-2.0.9-HMAC-memcmp-CVE-2013-2061_bnc843509.patch]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091317" comment="openvpn-2.2.2-9.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091318" comment="openvpn-auth-pam-plugin-2.2.2-9.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091319" comment="openvpn-down-root-plugin-2.2.2-9.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:191" version="1" class="patch">
	<metadata>
		<title>- update to SeaMonkey 2.22 (bnc#847708)</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- update to SeaMonkey 2.22 (bnc#847708)
  * rebased patches
  * requires NSS 3.15.2 or higher
  * MFSA 2013-93/CVE-2013-5590/CVE-2013-5591/CVE-2013-5592
    Miscellaneous memory safety hazards
  * MFSA 2013-94/CVE-2013-5593 (bmo#868327)
    Spoofing addressbar through SELECT element
  * MFSA 2013-95/CVE-2013-5604 (bmo#914017)
    Access violation with XSLT and uninitialized data
  * MFSA 2013-96/CVE-2013-5595 (bmo#916580)
    Improperly initialized memory and overflows in some JavaScript
    functions
  * MFSA 2013-97/CVE-2013-5596 (bmo#910881)
    Writing to cycle collected object during image decoding
  * MFSA 2013-98/CVE-2013-5597 (bmo#918864)
    Use-after-free when updating offline cache
  * MFSA 2013-99/CVE-2013-5598 (bmo#920515)
    Security bypass of PDF.js checks using iframes
  * MFSA 2013-100/CVE-2013-5599/CVE-2013-5600/CVE-2013-5601
    (bmo#915210, bmo#915576, bmo#916685)
    Miscellaneous use-after-free issues found through ASAN fuzzing
  * MFSA 2013-101/CVE-2013-5602 (bmo#897678)
    Memory corruption in workers
  * MFSA 2013-102/CVE-2013-5603 (bmo#916404)
    Use-after-free in HTML document templates		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091721" comment="seamonkey-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091722" comment="seamonkey-dom-inspector-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091723" comment="seamonkey-irc-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091724" comment="seamonkey-translations-common-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091725" comment="seamonkey-translations-other-2.22-1.25.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091726" comment="seamonkey-venkman-2.22-1.25.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:192" version="1" class="patch">
	<metadata>
		<title>- Applied upstream fix for a denial-of-service and authorization</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- Applied upstream fix for a denial-of-service and authorization
  bypass vulnerability via crafted ID payload in strongswan 4.3.3
  up to 5.1.0 (CVE-2013-6075, bnc#847506).
  [0005-strongswan-4.3.3_5.1.0-bnc-847506-CVE-2013-6075.patch]
- Added missed references to patch file 0003.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091320" comment="strongswan-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091321" comment="strongswan-doc-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091322" comment="strongswan-ipsec-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091323" comment="strongswan-libs0-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091324" comment="strongswan-mysql-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091325" comment="strongswan-nm-5.0.1-4.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091326" comment="strongswan-sqlite-5.0.1-4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:193" version="1" class="patch">
	<metadata>
		<title>update for varnish</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issue with varnish:
- bnc#848451, CVE-2013-4484: fixed denial of service flaw in certain GET requests when using certain configurations in Varnish Cache handling		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091419" comment="libvarnishapi1-3.0.3-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091420" comment="varnish-3.0.3-2.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091421" comment="varnish-devel-3.0.3-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:194" version="1" class="patch">
	<metadata>
		<title>update for apache2-mod_fcgid</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
security issue fixed in apache2-mod_fcgid:

  loop counter handled incorrectly, leading to SEGV and
  &amp;quot;Premature end of script headers&amp;quot; errors. [bnc#844935]
  CVE-2013-4365
  This patch will be obsoleted by the next version update (to
  2.3.9 or higher).

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091353" comment="apache2-mod_fcgid-2.3.6-11.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:195" version="1" class="patch">
	<metadata>
		<title>update for wireshark</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
the following security issues were fixed in wireshark:
    * The IEEE 802.15.4 dissector could crash
      wnpa-sec-2013-61 CVE-2013-6336
    * The NBAP dissector could crash
      wnpa-sec-2013-62 CVE-2013-6337
    * The SIP dissector could crash
      wnpa-sec-2013-63 CVE-2013-6338
    * The OpenWire dissector could go into a large loop
      wnpa-sec-2013-64 CVE-2013-6339
    * The TCP dissector could crash
      wnpa-sec-2013-65 CVE-2013-6340
  + Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.8.11.html
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091361" comment="wireshark-1.8.11-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091362" comment="wireshark-devel-1.8.11-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:196" version="1" class="patch">
	<metadata>
		<title>update for whois</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- update to 5.0.26 [bnc#848594]
  * Added the .cf TLD server.
  * Updated the .bi TLD server.
  * Added a new ASN allocation.
- includes changes from 5.0.25
  * Added the .ax, .bn, .iq, .pw and .rw TLD servers.
  * Updated one or more translations.
- includes updates changes 5.0.24:
  * Merged documentation fixes and the whois.conf(5) man page
  * Added a new ASN allocation.
  * Updated one or more translations.
- includes changes from 5.0.23
  * whois.nic.or.kr switched from EUC-KR to UTF-8.
- includes changes from 5.0.22
  * Fixed cross-compiling
- includes changes from 5.0.21
  * Fixed parsing of 6to4 addresses
  * Added the .xn--j1amh (.??????, Ukraine) TLD server.
  * Updated the .bi, .se and .vn TLD servers.
  * Removed whois.pandi.or.id from the list of servers which support the
    RIPE extensions, since it does not anymore and queries are broken.
  * Updated some disclaimer suppression strings.
  * Respect DEB_HOST_GNU_TYPE when selecting CC for cross-compiling.
- includes changes form 5.0.20
  * Updated the .by, .ng, .om, .sm, .tn, .ug and .vn TLD servers.
  * Added the .bw, .td, .xn--mgb9awbf (????????., Oman), .xn--mgberp4a5d4ar
    (.????????????????, Saudi Arabia) and .xn--mgbx4cd0ab (??????????????????., Malaysia)
    TLD servers.
  * Removed the .kp, .mc, .rw and .xn--mgba3a4f16a (??????????., Iran) TLD servers.
- includes changes from 5.0.19
  * Added the .post TLD server.
  * Updated the .co.za SLD servers.
  * Added the .alt.za, .net.za and .web.za SLD servers.
  * whois.ua changed (?) the encoding to utf-8.
  * Fixed the parsing of 6to4 addresses like whois 2002:xxxx::.
- includes changes from 5.0.18
  * Updated the .ae and .xn--mgbaam7a8h (.????????????, United Arabs Emirates)
    TLDs.
  * Updated the server charset table for .fr and .it.
- includes changes from whois 5.0.17
  * Updated the .bi, .fo, .gr and .gt TLD servers.
  * Removed support for recursion of .org queries, it has been a thick
    registry since 2005.
- includes changes from 5.0.16
  * Added the .xn--80ao21a (.??????, Kazakhstan) TLD server.
  * Updated the .ec and .ee TLD servers.
  * Removed the .xn--mgbc0a9azcg (.????????????, Morocco) and .xn--mgberp4a5d4ar
    (.????????????????, Saudi Arabia) TLD servers.
  * Added a new ASN allocation.
  * Updated one or more translations.
- includes changes from 5.0.15
  * Added the .xn--mgba3a4f16a (??????????., Iran) TLD server.
  * Updated the .pe TLD server, this time for real.
  * Updated one or more translations.
- includes changes from 5.0.14
  * Added the .sx TLD server.
  * Updated the .pe TLD server.
- includes changes from 5.0.13
  * Updated the .hr TLD server.
  * Improved the package description
  * Updated the FSF address in licenses.
- includes changes from 5.0.12
  * Recursion disabled when the query string contains spaces, because
    probably the query format will not be compatible with the referral
    server (e.g. whois to rwhois or ARIN to RIPE).
  * Add the &amp;quot;+&amp;quot; flag by default to queries to whois.arin.net if the
    argument looks like an IP address. Also add the &amp;quot;a&amp;quot; and &amp;quot;n&amp;quot; flags.
    No thanks to ARIN for breaking every whois client.
  * Added the .cv, .lk, .mq, .sy, .so, .biz.ua, .co.ua, .pp.ua, .qa,
    .xn--3e0b707e (.??????, Korea), .xn--45brj9c (.????????????, India, Bengali),
    .xn--90a3ac (.??????, Serbia), .xn--clchc0ea0b2g2a9gcd (.?????????????????????????????????,
    Singapore, Tamil), .xn--fpcrj9c3d (.???????????????, India, Telugu), .xn--fzc2c9e2c
    (.????????????, Sri Lanka, Sinhala), .xn--gecrj9c (.????????????, India, Gujarati),
    .xn--h2brj9c (.????????????, India, Hindi), .xn--lgbbat1ad8j (.??????????????, Algeria),
    .xn--mgbayh7gpa (.????????????, Jordan), .xn--mgbbh1a71e (.??????????, India, Urdu),
    .xn--mgbc0a9azcg (.????????????, Morocco), .xn--ogbpf8fl (.??????????, Syria),
    .xn--s9brj9c (.????????????, India, Punjabi), .xn--xkc2al3hye2a (.??????????????????, Sri
    Lanka, Tamil), .xn--wgbl6a (.??????, Qatar), .xn--xkc2dl3a5ee0h
    (.?????????????????????, India, Tamil), .xn--yfro4i67o (.?????????, Singapore, Chinese) and
    .xxx TLD servers. (Closes: #642424),
  * Added the .priv.at pseudo-SLD server.
  * Updated the .co, .gf, .gp, .kr, .li, .rs, .ru, .su, .sv, .ua and
    .xn--p1ai TLD servers. (Closes: #590425, #634830, #627478)
  * Added a new ASN allocation.
  * Fixed a typo and -t syntax in whois(1). (Closes: #614973, #632588)
  * Made whois return an error in some cases, code contributed by
    David Souther.
  * Split HAVE_LINUX_CRYPT_GENSALT from HAVE_XCRYPT to support SuSE,
    which has it builtin in the libc. Added untested support for Solaris'
    crypt_gensalt(3). This and the following changes have been contributed
    by Ludwig Nussel of SuSE.
  * mkpasswd: stop rejecting non-ASCII characters.
  * mkpasswd: added support for the 2y algorithm, which fixes CVE-2011-2483.
  * mkpasswd: raised the number of rounds for 2a/2y from 4 to 5, which is
    the current default.
  * mkpasswd: removed support for 2 and {SHA}, which actually are not
    supported by FreeBSD and libxcrypt.
- packaging changes
  * removed patches accepted upstream:
     whois-5.0.11-mkpasswd-support-Owl-patched-libcrypt.diff
     whois-5.0.11-mkpasswd-crypt_gensalt-might-change-the-prefix.diff
     whois-5.0.11-mkpasswd-support-8bit-characters.diff
     whois-5.0.11-mkpasswd-add-support-for-the-new-2y-blowfish-tag-CVE-2011-2483.diff
     whois-5.0.11-mkpasswd-set-default-blowfish-rounds-to-5.diff
     whois-5.0.11-mkpasswd-remove-obsolete-settings.diff
  * removed patches no longer required:
     whois-5.0.11-mkpasswd-fix-compiler-warnings.diff
  * updated patches:
     whois-4.7.33-nb.patch to whois-5.0.25-nb.patch
  * verify source signatures
- crypt_gensalt moved to separate library libowcrypt (fate#314945)

- update to 5.0.26 [bnc#848594]
  * Added the .cf TLD server.
  * Updated the .bi TLD server.
  * Added a new ASN allocation.
- includes changes from 5.0.25
  * Added the .ax, .bn, .iq, .pw and .rw TLD servers.
  * Updated one or more translations.
- includes updates changes 5.0.24:
  * Merged documentation fixes and the whois.conf(5) man page
  * Added a new ASN allocation.
  * Updated one or more translations.
- includes changes from 5.0.23
  * whois.nic.or.kr switched from EUC-KR to UTF-8.
- includes changes from 5.0.22
  * Fixed cross-compiling
- includes changes from 5.0.21
  * Fixed parsing of 6to4 addresses
  * Added the .xn--j1amh (.??????, Ukraine) TLD server.
  * Updated the .bi, .se and .vn TLD servers.
  * Removed whois.pandi.or.id from the list of servers which support the
    RIPE extensions, since it does not anymore and queries are broken.
  * Updated some disclaimer suppression strings.
  * Respect DEB_HOST_GNU_TYPE when selecting CC for cross-compiling.
- includes changes form 5.0.20
  * Updated the .by, .ng, .om, .sm, .tn, .ug and .vn TLD servers.
  * Added the .bw, .td, .xn--mgb9awbf (????????., Oman), .xn--mgberp4a5d4ar
    (.????????????????, Saudi Arabia) and .xn--mgbx4cd0ab (??????????????????., Malaysia)
    TLD servers.
  * Removed the .kp, .mc, .rw and .xn--mgba3a4f16a (??????????., Iran) TLD servers.
- includes changes from 5.0.19
  * Added the .post TLD server.
  * Updated the .co.za SLD servers.
  * Added the .alt.za, .net.za and .web.za SLD servers.
  * whois.ua changed (?) the encoding to utf-8.
  * Fixed the parsing of 6to4 addresses like whois 2002:xxxx::.
- includes changes from 5.0.18
  * Updated the .ae and .xn--mgbaam7a8h (.????????????, United Arabs Emirates)
    TLDs.
  * Updated the server charset table for .fr and .it.
- includes changes from whois 5.0.17
  * Updated the .bi, .fo, .gr and .gt TLD servers.
  * Removed support for recursion of .org queries, it has been a thick
    registry since 2005.
- includes changes from 5.0.16
  * Added the .xn--80ao21a (.??????, Kazakhstan) TLD server.
  * Updated the .ec and .ee TLD servers.
  * Removed the .xn--mgbc0a9azcg (.????????????, Morocco) and .xn--mgberp4a5d4ar
    (.????????????????, Saudi Arabia) TLD servers.
  * Added a new ASN allocation.
  * Updated one or more translations.
- includes changes from 5.0.15
  * Added the .xn--mgba3a4f16a (??????????., Iran) TLD server.
  * Updated the .pe TLD server, this time for real.
  * Updated one or more translations.
- includes changes from 5.0.14
  * Added the .sx TLD server.
  * Updated the .pe TLD server.
- includes changes from 5.0.13
  * Updated the .hr TLD server.
  * Improved the package description
  * Updated the FSF address in licenses.
- includes changes from 5.0.12
  * Recursion disabled when the query string contains spaces, because
    probably the query format will not be compatible with the referral
    server (e.g. whois to rwhois or ARIN to RIPE).
  * Add the &amp;quot;+&amp;quot; flag by default to queries to whois.arin.net if the
    argument looks like an IP address. Also add the &amp;quot;a&amp;quot; and &amp;quot;n&amp;quot; flags.
    No thanks to ARIN for breaking every whois client.
  * Added the .cv, .lk, .mq, .sy, .so, .biz.ua, .co.ua, .pp.ua, .qa,
    .xn--3e0b707e (.??????, Korea), .xn--45brj9c (.????????????, India, Bengali),
    .xn--90a3ac (.??????, Serbia), .xn--clchc0ea0b2g2a9gcd (.?????????????????????????????????,
    Singapore, Tamil), .xn--fpcrj9c3d (.???????????????, India, Telugu), .xn--fzc2c9e2c
    (.????????????, Sri Lanka, Sinhala), .xn--gecrj9c (.????????????, India, Gujarati),
    .xn--h2brj9c (.????????????, India, Hindi), .xn--lgbbat1ad8j (.??????????????, Algeria),
    .xn--mgbayh7gpa (.????????????, Jordan), .xn--mgbbh1a71e (.??????????, India, Urdu),
    .xn--mgbc0a9azcg (.????????????, Morocco), .xn--ogbpf8fl (.??????????, Syria),
    .xn--s9brj9c (.????????????, India, Punjabi), .xn--xkc2al3hye2a (.??????????????????, Sri
    Lanka, Tamil), .xn--wgbl6a (.??????, Qatar), .xn--xkc2dl3a5ee0h
    (.?????????????????????, India, Tamil), .xn--yfro4i67o (.?????????, Singapore, Chinese) and
    .xxx TLD servers. (Closes: #642424),
  * Added the .priv.at pseudo-SLD server.
  * Updated the .co, .gf, .gp, .kr, .li, .rs, .ru, .su, .sv, .ua and
    .xn--p1ai TLD servers. (Closes: #590425, #634830, #627478)
  * Added a new ASN allocation.
  * Fixed a typo and -t syntax in whois(1). (Closes: #614973, #632588)
  * Made whois return an error in some cases, code contributed by
    David Souther.
  * Split HAVE_LINUX_CRYPT_GENSALT from HAVE_XCRYPT to support SuSE,
    which has it builtin in the libc. Added untested support for Solaris'
    crypt_gensalt(3). This and the following changes have been contributed
    by Ludwig Nussel of SuSE.
  * mkpasswd: stop rejecting non-ASCII characters.
  * mkpasswd: added support for the 2y algorithm, which fixes CVE-2011-2483.
  * mkpasswd: raised the number of rounds for 2a/2y from 4 to 5, which is
    the current default.
  * mkpasswd: removed support for 2 and {SHA}, which actually are not
    supported by FreeBSD and libxcrypt.
- packaging changes
  * removed patches accepted upstream:
     whois-5.0.11-mkpasswd-support-Owl-patched-libcrypt.diff
     whois-5.0.11-mkpasswd-crypt_gensalt-might-change-the-prefix.diff
     whois-5.0.11-mkpasswd-support-8bit-characters.diff
     whois-5.0.11-mkpasswd-add-support-for-the-new-2y-blowfish-tag-CVE-2011-2483.diff
     whois-5.0.11-mkpasswd-set-default-blowfish-rounds-to-5.diff
     whois-5.0.11-mkpasswd-remove-obsolete-settings.diff
  * removed patches no longer required:
     whois-5.0.11-mkpasswd-fix-compiler-warnings.diff
  * updated patches:
     whois-4.7.33-nb.patch to whois-5.0.25-nb.patch
  * verify source signatures
- crypt_gensalt moved to separate library libowcrypt (fate#314945)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091363" comment="whois-5.0.26-12.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:197" version="1" class="patch">
	<metadata>
		<title>chromium: 31.0.1650.57 version update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Security and bugfix update to Chromium 31.0.1650.57

- Update to Chromium 31.0.1650.57:
  - Security Fixes:
    * CVE-2013-6632: Multiple memory corruption issues.

- Update to Chromium 31.0.1650.48
  Stable Channel update: 
  - Security fixes:
    * CVE-2013-6621: Use after free related to speech input elements..
    * CVE-2013-6622: Use after free related to media elements. 
    * CVE-2013-6623: Out of bounds read in SVG.
    * CVE-2013-6624: Use after free related to “id” attribute strings.
    * CVE-2013-6625: Use after free in DOM ranges.
    * CVE-2013-6626: Address bar spoofing related to interstitial warnings.
    * CVE-2013-6627: Out of bounds read in HTTP parsing.
    * CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation.
    * CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives.
    * CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo.
    * CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo.
    * CVE-2013-6631: Use after free in libjingle.

- Stable Channel update: fix build for 32bit systems

- Update to Chromium 30.0.1599.101
  - Security Fixes:
    + CVE-2013-2925: Use after free in XHR
    + CVE-2013-2926: Use after free in editing
    + CVE-2013-2927: Use after free in forms.
    + CVE-2013-2928: Various fixes from internal audits, 
                     fuzzing and other initiatives.
- Enable ARM build for Chromium. 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091686" comment="chromedriver-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091687" comment="chromium-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091688" comment="chromium-desktop-gnome-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091689" comment="chromium-desktop-kde-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091690" comment="chromium-ffmpegsumo-31.0.1650.57-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091691" comment="chromium-suid-helper-31.0.1650.57-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:198" version="1" class="patch">
	<metadata>
		<title>update for samba</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
the following security issues were fixed in samba:
- ACLs are not checked on opening an alternate data stream on a file or
  directory; CVE-2013-4475; (bso#10229); (bnc#848101).

- Fix memleak in reload_printers_full(); (bso#9993).

- Valid utf8 filenames cause &amp;quot;invalid conversion error&amp;quot; messages; (bso#10139).
- s3: smb2 breaks &amp;quot;smb encryption = mandatory&amp;quot;; (bso#10167).
- Missing talloc_free can leak stackframe in error path; (bso#10187).
- Offline logon cache not updating for cross child domain group membership;
  (bso#10194).
- The preceding bugs are tracked by (bnc#849226) too.

- Make Samba work on site with Read Only Domain Controller; (bso#5917).
- Give machine password changes 10 minutes of time; (bso#8955).
- NetrServerPasswordSet2 timeout is too short; (bso#8955).
- Fix fallback to ncacn_np in cm_connect_lsat(); (bso#9615); (bso#9899).
- s3-winbind: Do not delete an existing valid credential cache; (bso#9994).
- 'net ads join': Fix segmentation fault in
  create_local_private_krb5_conf_for_domain; (bso#10073).
- Fix variable list in man vfs_crossrename; (bso#10076).
- MacOSX 10.9 will not follow path-based DFS referrals handed out by Samba;
  (bso#10097).
- Honour output buffer length set by the client for SMB2 GetInfo requests;
  (bso#10106).
- Handle Dropbox (write-only-directory) case correctly in pathname lookup;
  (bso#10114).
- Fix 'smbstatus' as non-root user; (bso#10127).
- The preceding bugs are tracked by (bnc#849226) too.

- Windows 8 Roaming profiles fail; (bso#9678).
- Linux kernel oplock breaks can miss signals; (bso#10064).
- The preceding bugs are tracked by (bnc#849226) too.

- Verify source tar ball gpg signature.

- Store and return the correct spoolss jobid in notifications; (bnc#838472).


- Reload snums before processing the printer list. (bnc#817880).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091727" comment="samba-doc-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091728" comment="libnetapi-devel-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091729" comment="libnetapi0-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091730" comment="libsmbclient-devel-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091731" comment="libsmbclient0-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091732" comment="libsmbclient0-32bit-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091733" comment="libsmbsharemodes-devel-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091734" comment="libsmbsharemodes0-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091735" comment="libwbclient-devel-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091736" comment="libwbclient0-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091737" comment="libwbclient0-32bit-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091738" comment="samba-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091739" comment="samba-32bit-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091740" comment="samba-client-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091741" comment="samba-client-32bit-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091742" comment="samba-devel-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091743" comment="samba-krb-printing-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091744" comment="samba-winbind-3.6.12-59.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091745" comment="samba-winbind-32bit-3.6.12-59.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:199" version="1" class="patch">
	<metadata>
		<title>krb5: fix Multi-realm KDC null deref</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issue with krb5:
- bnc#849240, CVE-2013-1418: fix Multi-realm KDC null deref		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091522" comment="krb5-doc-1.10.2-10.22.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091523" comment="krb5-mini-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091524" comment="krb5-mini-devel-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091525" comment="krb5-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091526" comment="krb5-32bit-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091527" comment="krb5-client-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091528" comment="krb5-devel-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091529" comment="krb5-devel-32bit-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091530" comment="krb5-plugin-kdb-ldap-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091531" comment="krb5-plugin-preauth-pkinit-1.10.2-10.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091532" comment="krb5-server-1.10.2-10.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:200" version="1" class="patch">
	<metadata>
		<title>update for mozilla-nss and mozilla-nspr</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
the following security issues were fixed in mozilla-nss and mozilla nspr:
- mozilla-nss:
  + update to 3.15.3 (bnc#850148)
    * CERT_VerifyCert returns SECSuccess (saying certificate is good) even for bad certificates, when the CERTVerifyLog log parameter is given (bmo#910438)
    * NSS advertises TLS 1.2 ciphersuites in a TLS 1.1 ClientHello (bmo#919677)
    * fix CVE-2013-5605

- mozilla-nspr:
  + update to version 4.10.2
    relevant changes:
    * bmo#770534: possible pointer overflow in PL_ArenaAllocate()
    * bmo#888546: ptio.c:PR_ImportUDPSocket doesn't work		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091465" comment="mozilla-nspr-32bit-4.10.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091466" comment="mozilla-nspr-4.10.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091467" comment="mozilla-nspr-devel-4.10.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091468" comment="libfreebl3-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091469" comment="libfreebl3-32bit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091470" comment="libsoftokn3-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091471" comment="libsoftokn3-32bit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091472" comment="mozilla-nss-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091473" comment="mozilla-nss-32bit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091474" comment="mozilla-nss-certs-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091475" comment="mozilla-nss-certs-32bit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091476" comment="mozilla-nss-devel-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091477" comment="mozilla-nss-sysinit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091478" comment="mozilla-nss-sysinit-32bit-3.15.3-1.20.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091479" comment="mozilla-nss-tools-3.15.3-1.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201" version="1" class="patch">
	<metadata>
		<title>librsvg: fixed XML External Entity inclusion problem</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

librsvg was updated to fix a denial a XML External Entity Inclusion problem,
where files on the system could be imported into the SVG. (CVE-2013-1881)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092047" comment="gtk3-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092048" comment="gtk3-branding-upstream-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092049" comment="gtk3-data-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092050" comment="gtk3-devel-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092051" comment="gtk3-devel-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092052" comment="gtk3-immodule-amharic-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092053" comment="gtk3-immodule-amharic-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092054" comment="gtk3-immodule-inuktitut-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092055" comment="gtk3-immodule-inuktitut-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092056" comment="gtk3-immodule-multipress-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092057" comment="gtk3-immodule-multipress-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092058" comment="gtk3-immodule-thai-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092059" comment="gtk3-immodule-thai-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092060" comment="gtk3-immodule-vietnamese-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092061" comment="gtk3-immodule-vietnamese-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092062" comment="gtk3-immodule-xim-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092063" comment="gtk3-immodule-xim-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092064" comment="gtk3-immodules-tigrigna-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092065" comment="gtk3-immodules-tigrigna-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092066" comment="gtk3-lang-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092067" comment="gtk3-tools-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092068" comment="gtk3-tools-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092069" comment="libgtk-3-0-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092070" comment="libgtk-3-0-32bit-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092071" comment="typelib-1_0-Gtk-3_0-3.6.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092072" comment="gdk-pixbuf-loader-rsvg-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092073" comment="gdk-pixbuf-loader-rsvg-32bit-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092074" comment="gtk2-engine-svg-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092075" comment="gtk2-engine-svg-32bit-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092076" comment="librsvg-2-2-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092077" comment="librsvg-2-2-32bit-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092078" comment="librsvg-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092079" comment="librsvg-devel-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092080" comment="rsvg-view-2.36.4-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092081" comment="typelib-1_0-Rsvg-2_0-2.36.4-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202" version="1" class="patch">
	<metadata>
		<title>nginx: fixed restriction bypass problem</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The nginx webserver was fixed to avoid a restriction bypass when a space in not
correctly escaped. (CVE-2013-4547)

On openSUSE 12.2, nginx was updated to version 1.4.4 stable 
* CVE-2013-4547 a character following an unescaped space 
  in a request line was handled incorrectly [bnc#851295]
* bugfix: segmentation fault might occur in the spdy module
* bugfix: segmentation fault might occur on start if
  if the &amp;quot;try_files&amp;quot; directive was used with an empty
  parameter.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091594" comment="nginx-1.2.9-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:203" version="1" class="patch">
	<metadata>
		<title>update for horde5</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- it fixes  config directory permission and owner for bnc#811369
		CVE-2013-1090
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091757" comment="horde5-5.0.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:204" version="1" class="patch">
	<metadata>
		<title>subversion: update to 1.7.14</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following issues with subversion:
- bnc#850747: update to 1.7.14
  * CVE-2013-4505: mod_dontdothat does not restrict requests from
                   serf clients.
  * CVE-2013-4558: mod_dav_svn assertion triggered by 
                   autoversioning commits.

  + Client- and server-side bugfixes:
    * fix assertion on urls of the form 'file://./'
  + Client-side bugfixes:
    * upgrade: fix an assertion when used with pre-1.3 wcs
    * fix externals that point at redirected locations
    * diff: fix incorrect calculation of changes in some cases
    * diff: fix errors with added/deleted targets
  + Server-side bugfixes:
    * mod_dav_svn: Prevent crashes with some 3rd party modules
    * fix OOM on concurrent requests at threaded server start
    * fsfs: limit commit time of files with deep change histories
    * mod_dav_svn: canonicalize paths properly
  + Other tool improvements and bugfixes:
    * mod_dontdothat: Fix the uri parser
  + Developer-visible changes:
    * javahl: canonicalize path for streamFileContent method
  + require python-sqlite when running regression tests		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091895" comment="libsvn_auth_gnome_keyring-1-0-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091896" comment="libsvn_auth_kwallet-1-0-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091897" comment="subversion-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091898" comment="subversion-bash-completion-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091899" comment="subversion-devel-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091900" comment="subversion-perl-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091901" comment="subversion-python-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091902" comment="subversion-server-1.7.14-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091903" comment="subversion-tools-1.7.14-2.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:205" version="1" class="patch">
	<metadata>
		<title>update for ruby19</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
 The following security issue was fixed in ruby19:
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091813" comment="ruby19-1.9.3.p392-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091814" comment="ruby19-devel-1.9.3.p392-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091815" comment="ruby19-devel-extra-1.9.3.p392-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091816" comment="ruby19-doc-ri-1.9.3.p392-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091817" comment="ruby19-tk-1.9.3.p392-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:206" version="1" class="patch">
	<metadata>
		<title>update for curl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issues with curl:

- fix CVE-2013-4545 (bnc#849596)
  = acknowledge VERIFYHOST without VERIFYPEER
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091904" comment="curl-7.28.1-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091905" comment="libcurl-devel-7.28.1-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091906" comment="libcurl4-32bit-7.28.1-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091907" comment="libcurl4-7.28.1-4.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:207" version="1" class="patch">
	<metadata>
		<title>update for nodejs</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issue with nodejs:

- fix CVE-2013-4450: nodejs: HTTP Pipelining DoS (bnc#846808)
  CVE-2013-4450-v0.10.x.patch: contains the fix 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091908" comment="nodejs-0.8.12-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091909" comment="nodejs-devel-0.8.12-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:208" version="1" class="patch">
	<metadata>
		<title>update for thttpd</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issue with thttpd:

- fix CVE-2013-0348 (bnc#853381)
  * don't create a world readable logfile
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091910" comment="thttpd-2.25b-195.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:209" version="1" class="patch">
	<metadata>
		<title>ca-certificates-mozilla: add, remove or blacklist some certificates</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The Mozilla CA certificates package was updated to match the current Mozilla revision
1.95 of certdata.txt.

It blacklists some misused certificate authorities, adds some new and adjusts some others.

On openSUSE 13.1 a problem with names was also fixed.

* distrust: AC DG Tresor SSL (bnc#854367)
* new: CA_Disig_Root_R1:2.9.0.195.3.154.238.80.144.110.40.crt
    server auth, code signing, email signing
* new: CA_Disig_Root_R2:2.9.0.146.184.136.219.176.138.193.99.crt
    server auth, code signing, email signing
* new: China_Internet_Network_Information_Center_EV_Certificates_Root:2.4.72.159.0.1.crt
    server auth
* changed: Digital_Signature_Trust_Co._Global_CA_1:2.4.54.112.21.150.crt
    removed code signing and server auth abilities
* changed: Digital_Signature_Trust_Co._Global_CA_3:2.4.54.110.211.206.crt
    removed code signing and server auth abilities
* new: D-TRUST_Root_Class_3_CA_2_2009:2.3.9.131.243.crt
    server auth
* new: D-TRUST_Root_Class_3_CA_2_EV_2009:2.3.9.131.244.crt
    server auth
* removed: Equifax_Secure_eBusiness_CA_2:2.4.55.112.207.181.crt
* new: PSCProcert:2.1.11.crt
    server auth, code signing, email signing
* new: Swisscom_Root_CA_2:2.16.30.158.40.232.72.242.229.239.195.124.74.30.90.24.103.182.crt
    server auth, code signing, email signing
* new: Swisscom_Root_EV_CA_2:2.17.0.242.250.100.226.116.99.211.141.253.16.29.4.31.118.202.88.crt
    server auth, code signing
* changed: TC_TrustCenter_Universal_CA_III:2.14.99.37.0.1.0.2.20.141.51.21.2.228.108.244.crt
    removed all abilities
* new: TURKTRUST_Certificate_Services_Provider_Root_2007:2.1.1.crt
    server auth, code signing
* changed: TWCA_Root_Certification_Authority:2.1.1.crt
    added code signing ability
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091987" comment="ca-certificates-mozilla-1.95-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:210" version="1" class="patch">
	<metadata>
		<title>update for chromium</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Update to Chromium 31.0.1650.63
  Stable channel update:
  - Security fixes:
    * CVE-2013-6634: Session fixation in sync related to 302 redirects
    * CVE-2013-6635: Use-after-free in editing
    * CVE-2013-6636: Address bar spoofing related to modal dialogs
    * CVE-2013-6637: Various fixes from internal audits, fuzzing and other initiatives.
    * CVE-2013-6638: Buffer overflow in v8
    * CVE-2013-6639: Out of bounds write in v8.
    * CVE-2013-6640: Out of bounds read in v8
    * and 12 other security fixes.

- Remove the build flags to build according to the Chrome ffmpeg
  branding and the proprietary codecs. (bnc#847971)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092208" comment="chromedriver-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092209" comment="chromium-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092210" comment="chromium-desktop-gnome-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092211" comment="chromium-desktop-kde-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092212" comment="chromium-ffmpegsumo-31.0.1650.63-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092213" comment="chromium-suid-helper-31.0.1650.63-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:211" version="1" class="patch">
	<metadata>
		<title>update for rubygem-actionpack-3_2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- fix CVE-2013-4491: rubygem-actionpack: i18n missing translation 
  XSS (bnc#853625). File CVE-2013-4491.patch contains the patch
- fix CVE-2013-6414: rubygem-actionpack: Action View DoS 
  (bnc#853633). File CVE-2013-6414.patch contains the patch.
- fix CVE-2013-6415: rubygem-actionpack: number_to_currency XSS 
  (bnc#853632). File CVE-2013-6415.patch contains the patch.
- fix CVE-2013-6417: rubygem-actionpack: unsafe query generation 
  risk (incomplete fix for CVE-2013-0155) (bnc#853627). File 
  CVE-2013-6417.patch contains the patch.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092082" comment="rubygem-actionpack-3_2-3.2.12-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092083" comment="rubygem-actionpack-3_2-doc-3.2.12-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:212" version="1" class="patch">
	<metadata>
		<title>update for MozillaFirefox</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- update to Firefox 26.0 (bnc#854367, bnc#854370)
  * rebased patches
  * requires NSPR 4.10.2 and NSS 3.15.3.1
  * MFSA 2013-104/CVE-2013-5609/CVE-2013-5610
    Miscellaneous memory safety hazards
  * MFSA 2013-105/CVE-2013-5611 (bmo#771294)
    Application Installation doorhanger persists on navigation
  * MFSA 2013-106/CVE-2013-5612 (bmo#871161)
    Character encoding cross-origin XSS attack
  * MFSA 2013-107/CVE-2013-5614 (bmo#886262)
    Sandbox restrictions not applied to nested object elements
  * MFSA 2013-108/CVE-2013-5616 (bmo#938341)
    Use-after-free in event listeners
  * MFSA 2013-109/CVE-2013-5618 (bmo#926361)
    Use-after-free during Table Editing
  * MFSA 2013-110/CVE-2013-5619 (bmo#917841)
    Potential overflow in JavaScript binary search algorithms
  * MFSA 2013-111/CVE-2013-6671 (bmo#930281)
    Segmentation violation when replacing ordered list elements
  * MFSA 2013-112/CVE-2013-6672 (bmo#894736)
    Linux clipboard information disclosure though selection paste
  * MFSA 2013-113/CVE-2013-6673 (bmo#970380)
    Trust settings for built-in roots ignored during EV certificate
    validation
  * MFSA 2013-114/CVE-2013-5613 (bmo#930381, bmo#932449)
    Use-after-free in synthetic mouse movement
  * MFSA 2013-115/CVE-2013-5615 (bmo#929261)
    GetElementIC typed array stubs can be generated outside observed
    typesets
  * MFSA 2013-116/CVE-2013-6629/CVE-2013-6630 (bmo#891693)
    JPEG information leak
  * MFSA 2013-117 (bmo#946351)
    Mis-issued ANSSI/DCSSI certificate
    (fixed via NSS 3.15.3.1)
- removed gecko.js preference file as GStreamer is enabled by
  default now
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092084" comment="MozillaFirefox-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092085" comment="MozillaFirefox-branding-upstream-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092086" comment="MozillaFirefox-buildsymbols-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092087" comment="MozillaFirefox-devel-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092088" comment="MozillaFirefox-translations-common-26.0-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092089" comment="MozillaFirefox-translations-other-26.0-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:213" version="1" class="patch">
	<metadata>
		<title>update for MozillaThunderbird</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- update to Thunderbird 24.2.0 (bnc#854370)
  * requires NSS 3.15.3.1 or higher
  * MFSA 2013-104/CVE-2013-5609/CVE-2013-5610
    Miscellaneous memory safety hazards
  * MFSA 2013-108/CVE-2013-5616 (bmo#938341)
    Use-after-free in event listeners
  * MFSA 2013-109/CVE-2013-5618 (bmo#926361)
    Use-after-free during Table Editing
  * MFSA 2013-111/CVE-2013-6671 (bmo#930281)
    Segmentation violation when replacing ordered list elements
  * MFSA 2013-113/CVE-2013-6673 (bmo#970380)
    Trust settings for built-in roots ignored during EV certificate
    validation
  * MFSA 2013-114/CVE-2013-5613 (bmo#930381, bmo#932449)
    Use-after-free in synthetic mouse movement
  * MFSA 2013-115/CVE-2013-5615 (bmo#929261)
    GetElementIC typed array stubs can be generated outside observed
    typesets
  * MFSA 2013-116/CVE-2013-6629/CVE-2013-6630 (bmo#891693)
    JPEG information leak
  * MFSA 2013-117 (bmo#946351)
    Mis-issued ANSSI/DCSSI certificate
    (fixed via NSS 3.15.3.1)

- update to Thunderbird 24.1.1
  * requires NSPR 4.10.2 and NSS 3.15.3 for security reasons
  * fix binary compatibility issues for patch level updates
    (bmo#927073)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092266" comment="MozillaThunderbird-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092267" comment="MozillaThunderbird-buildsymbols-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092268" comment="MozillaThunderbird-devel-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092269" comment="MozillaThunderbird-translations-common-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092270" comment="MozillaThunderbird-translations-other-24.2.0-61.35.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092271" comment="enigmail-1.6.0+24.2.0-61.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:214" version="1" class="patch">
	<metadata>
		<title>update for lighttpd</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- added cve-2013-4508.patch and
  cve-2013-4508-regression-bug729480.patch: (bnc#849059)
  When defining an ssl.cipher-list, it works for the 'default'
  HTTPS setup ($SERVER[&amp;quot;socket&amp;quot;] 443 block), but when you utilize
  SNI ($HTTP[&amp;quot;host&amp;quot;] blocks within the $SERVER[&amp;quot;socket&amp;quot;] block) the
  ssl.cipher-list seems to not inherit into the host blocks and
  instead will default to include all of the available openssl
  ciphers (except SSL v2/v3 based if those are disabled)
- added cve-2013-4559.patch (bnc#850468)
  check success of setuid,setgid,setgroups
- added cve-2013-4560.patch (bnc#850469)
  FAM: fix use after free

- added cve-2013-4508.patch and
  cve-2013-4508-regression-bug729480.patch: (bnc#849059)
  When defining an ssl.cipher-list, it works for the 'default'
  HTTPS setup ($SERVER[&amp;quot;socket&amp;quot;] 443 block), but when you utilize
  SNI ($HTTP[&amp;quot;host&amp;quot;] blocks within the $SERVER[&amp;quot;socket&amp;quot;] block) the
  ssl.cipher-list seems to not inherit into the host blocks and
  instead will default to include all of the available openssl
  ciphers (except SSL v2/v3 based if those are disabled)
- added cve-2013-4559.patch (bnc#850468)
  check success of setuid,setgid,setgroups
- added cve-2013-4560.patch (bnc#850469)
  FAM: fix use after free

- added cve-2013-4508.patch and
  cve-2013-4508-regression-bug729480.patch: (bnc#849059)
  When defining an ssl.cipher-list, it works for the 'default'
  HTTPS setup ($SERVER[&amp;quot;socket&amp;quot;] 443 block), but when you utilize
  SNI ($HTTP[&amp;quot;host&amp;quot;] blocks within the $SERVER[&amp;quot;socket&amp;quot;] block) the
  ssl.cipher-list seems to not inherit into the host blocks and
  instead will default to include all of the available openssl
  ciphers (except SSL v2/v3 based if those are disabled)
- added cve-2013-4559.patch (bnc#850468)
  check success of setuid,setgid,setgroups
- added cve-2013-4560.patch (bnc#850469)
  FAM: fix use after free
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092927" comment="lighttpd-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092928" comment="lighttpd-mod_cml-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092929" comment="lighttpd-mod_geoip-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092930" comment="lighttpd-mod_magnet-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092931" comment="lighttpd-mod_mysql_vhost-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092932" comment="lighttpd-mod_rrdtool-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092933" comment="lighttpd-mod_trigger_b4_dl-1.4.31-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092934" comment="lighttpd-mod_webdav-1.4.31-6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:215" version="1" class="patch">
	<metadata>
		<title>update for mozilla-nss</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issue with mozilla-nss:

- update to 3.15.3.1 (bnc#854367)
  * includes certstore update (1.95) (bmo#946351)
    (explicitely distrust AC DG Tresor SSL)
- adapt specfile to ppc64le
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009091950" comment="libfreebl3-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091951" comment="libfreebl3-32bit-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091952" comment="libsoftokn3-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091953" comment="libsoftokn3-32bit-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091954" comment="mozilla-nss-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091955" comment="mozilla-nss-32bit-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091956" comment="mozilla-nss-certs-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091957" comment="mozilla-nss-certs-32bit-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091958" comment="mozilla-nss-devel-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091959" comment="mozilla-nss-sysinit-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091960" comment="mozilla-nss-sysinit-32bit-3.15.3.1-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009091961" comment="mozilla-nss-tools-3.15.3.1-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:216" version="1" class="patch">
	<metadata>
		<title>update for rubygem-i18n, rubygem-i18n-0_6</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issue with rubygem-i18n:

- fix bnc#854166: CVE-2013-4492: rubygem-i18n: missing translation 
  XSS. File CVE-2013-4492.patch.i18n.0.6.x contains the fix.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092214" comment="rubygem-i18n-0.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092215" comment="rubygem-i18n-doc-0.6.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092216" comment="rubygem-i18n-testsuite-0.6.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:217" version="1" class="patch">
	<metadata>
		<title>update for openttd</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issue with openttd:

- add patch 60.patch:
  Aircraft crashing near the map's border due to a lack of airports 
  could trigger a crash [CVE-2013-6411] [FS#5820] (bnc#853041)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092217" comment="openttd-1.3.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092218" comment="openttd-data-1.3.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092219" comment="openttd-dedicated-1.3.3-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:218" version="1" class="patch">
	<metadata>
		<title>update for rubygem-activesupport-3_2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issues with rubygem-activesupport-3_2:

- fix CVE-2013-4389: rubygem-actionmailer-3_1: possible DoS 
  vulnerability in the log subscriber component (bnc#846239)
  File CVE-2013-4389.patch contains the fix.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092220" comment="rubygem-activesupport-3_2-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092221" comment="rubygem-activesupport-3_2-doc-3.2.12-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:219" version="1" class="patch">
	<metadata>
		<title>update for rubygem-actionmailer-3_2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issue with rubygem-actionmailer-3_2:

- fix CVE-2013-4389: rubygem-actionmailer-3_1: possible DoS 
  vulnerability in the log subscriber component (bnc#846239)
  File CVE-2013-4389.patch contains the fix.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092222" comment="rubygem-actionmailer-3_2-3.2.12-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092223" comment="rubygem-actionmailer-3_2-doc-3.2.12-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:220" version="1" class="patch">
	<metadata>
		<title>update for rubygem-actionpack-3_2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issues with rubygem-actionpack-3_2:

- fix CVE-2013-4389: rubygem-actionmailer-3_1: possible DoS 
  vulnerability in the log subscriber component (bnc#846239)
  File CVE-2013-4389.patch contains the fix.
- fix CVE-2013-4491: rubygem-actionpack: i18n missing translation 
  XSS (bnc#853625). File CVE-2013-4491.patch contains the patch
- fix CVE-2013-6414: rubygem-actionpack: Action View DoS 
  (bnc#853633). File CVE-2013-6414.patch contains the patch.
- fix CVE-2013-6415: rubygem-actionpack: number_to_currency XSS 
  (bnc#853632). File CVE-2013-6415.patch contains the patch.
- fix CVE-2013-6417: rubygem-actionpack: unsafe query generation 
  risk (incomplete fix for CVE-2013-0155) (bnc#853627). File 
  CVE-2013-6417.patch contains the patch.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092537" comment="rubygem-actionpack-3_2-3.2.12-1.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092538" comment="rubygem-actionpack-3_2-doc-3.2.12-1.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:221" version="1" class="patch">
	<metadata>
		<title>update for seamonkey</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issues with SeaMonkey:

- update to SeaMonkey 2.23 (bnc#854370))
  * requires NSPR 4.10.2 and NSS 3.15.3.1
  * MFSA 2013-104/CVE-2013-5609/CVE-2013-5610
    Miscellaneous memory safety hazards
  * MFSA 2013-105/CVE-2013-5611 (bmo#771294)
    Application Installation doorhanger persists on navigation
  * MFSA 2013-106/CVE-2013-5612 (bmo#871161)
    Character encoding cross-origin XSS attack
  * MFSA 2013-107/CVE-2013-5614 (bmo#886262)
    Sandbox restrictions not applied to nested object elements
  * MFSA 2013-108/CVE-2013-5616 (bmo#938341)
    Use-after-free in event listeners
  * MFSA 2013-109/CVE-2013-5618 (bmo#926361)
    Use-after-free during Table Editing
  * MFSA 2013-110/CVE-2013-5619 (bmo#917841)
    Potential overflow in JavaScript binary search algorithms
  * MFSA 2013-111/CVE-2013-6671 (bmo#930281)
    Segmentation violation when replacing ordered list elements
  * MFSA 2013-112/CVE-2013-6672 (bmo#894736)
    Linux clipboard information disclosure though selection paste
  * MFSA 2013-113/CVE-2013-6673 (bmo#970380)
    Trust settings for built-in roots ignored during EV certificate
    validation
  * MFSA 2013-114/CVE-2013-5613 (bmo#930381, bmo#932449)
    Use-after-free in synthetic mouse movement
  * MFSA 2013-115/CVE-2013-5615 (bmo#929261)
    GetElementIC typed array stubs can be generated outside observed
    typesets
  * MFSA 2013-116/CVE-2013-6629/CVE-2013-6630 (bmo#891693)
    JPEG information leak
  * MFSA 2013-117 (bmo#946351)
    Mis-issued ANSSI/DCSSI certificate
    (fixed via NSS 3.15.3.1)
- rebased patches:
  * mozilla-nongnome-proxies.patch
  * mozilla-shared-nss-db.patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092539" comment="seamonkey-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092540" comment="seamonkey-dom-inspector-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092541" comment="seamonkey-irc-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092542" comment="seamonkey-translations-common-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092543" comment="seamonkey-translations-other-2.23-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092544" comment="seamonkey-venkman-2.23-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:222" version="1" class="patch">
	<metadata>
		<title>security update for v8</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Update spec-file to fit the changes in V8 (addition of internal
  ICU)
  * Building against system ICU
  * Regenerate Makefiles before using them

- Update to 3.22.24.8
  - Security fixes (bnc#854473):
    * CVE-2013-6638: Buffer overflow in v8
    * CVE-2013-6639: Out of bounds write in v8
    * CVE-2013-6640: Out of bounds read in v8

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092272" comment="libv8-3-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092273" comment="v8-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092274" comment="v8-devel-3.22.24.8-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092275" comment="v8-private-headers-devel-3.22.24.8-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:223" version="1" class="patch">
	<metadata>
		<title>Fixes a local vulnerability</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Fixed CVE-2013-3709: make the secret token file (secret_token.rb) readable only for the webyast user to avoid forging the session cookie (bnc#851116)		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092276" comment="webyast-base-0.3.43.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092277" comment="webyast-base-branding-default-0.3.43.1-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092278" comment="webyast-base-testsuite-0.3.43.1-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:224" version="1" class="patch">
	<metadata>
		<title>update for php5</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- security update
  * CVE-2013-6420.patch [bnc#854880]
  * CVE-2013-6712.patch [bnc#853045]
  * CVE-2013-4248.patch [bnc#837746]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092421" comment="apache2-mod_php5-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092422" comment="php5-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092423" comment="php5-bcmath-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092424" comment="php5-bz2-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092425" comment="php5-calendar-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092426" comment="php5-ctype-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092427" comment="php5-curl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092428" comment="php5-dba-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092429" comment="php5-devel-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092430" comment="php5-dom-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092431" comment="php5-enchant-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092432" comment="php5-exif-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092433" comment="php5-fastcgi-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092434" comment="php5-fileinfo-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092435" comment="php5-fpm-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092436" comment="php5-ftp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092437" comment="php5-gd-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092438" comment="php5-gettext-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092439" comment="php5-gmp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092440" comment="php5-iconv-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092441" comment="php5-imap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092442" comment="php5-intl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092443" comment="php5-json-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092444" comment="php5-ldap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092445" comment="php5-mbstring-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092446" comment="php5-mcrypt-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092447" comment="php5-mssql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092448" comment="php5-mysql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092449" comment="php5-odbc-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092450" comment="php5-openssl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092451" comment="php5-pcntl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092452" comment="php5-pdo-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092453" comment="php5-pear-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092454" comment="php5-pgsql-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092455" comment="php5-phar-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092456" comment="php5-posix-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092457" comment="php5-pspell-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092458" comment="php5-readline-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092459" comment="php5-shmop-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092460" comment="php5-snmp-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092461" comment="php5-soap-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092462" comment="php5-sockets-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092463" comment="php5-sqlite-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092464" comment="php5-suhosin-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092465" comment="php5-sysvmsg-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092466" comment="php5-sysvsem-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092467" comment="php5-sysvshm-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092468" comment="php5-tidy-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092469" comment="php5-tokenizer-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092470" comment="php5-wddx-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092471" comment="php5-xmlreader-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092472" comment="php5-xmlrpc-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092473" comment="php5-xmlwriter-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092474" comment="php5-xsl-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092475" comment="php5-zip-5.3.17-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092476" comment="php5-zlib-5.3.17-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:225" version="1" class="patch">
	<metadata>
		<title>update for wireshark</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>


- openSUSE 12.2 and 12.3: update to 1.8.12 [bnc#855980]
  + vulnerabilities fixed:
    * The SIP dissector could go into an infinite loop.
      wnpa-sec-2013-66 CVE-2013-7112
    * The NTLMSSP v2 dissector could crash. Discovered by Garming Sam.
      wnpa-sec-2013-68 CVE-2013-7114
  + Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.8.12.html

- openSUSE 13.1: update to 1.10.4 [bnc#855980]
  + vulnerabilities fixed:
    * The SIP dissector could go into an infinite loop.
      wnpa-sec-2013-66 CVE-2013-7112
    * The BSSGP dissector could crash.
     wnpa-sec-2013-67 CVE-2013-7113
    * The NTLMSSP v2 dissector could crash. Discovered by Garming Sam.
      wnpa-sec-2013-68 CVE-2013-7114
  + Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.10.4.html
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092545" comment="wireshark-1.8.12-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092546" comment="wireshark-devel-1.8.12-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:226" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server: fixed an overflow in trapezoid handling</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The X server was updated to fix a possible X server crash using invalid trapezoids.
(bnc#853846 CVE-2013-6424)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092477" comment="xorg-x11-server-7.6_1.13.2-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092478" comment="xorg-x11-server-extra-7.6_1.13.2-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092479" comment="xorg-x11-server-sdk-7.6_1.13.2-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:227" version="1" class="patch">
	<metadata>
		<title>update for pixman</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Added pixman-bnc853824-bfo67484-CVE-2013-6425-fix-underflow.patch
  for bnc#853824.  Fixes an integer underflow bug which can cause a
  crash.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092547" comment="libpixman-1-0-0.28.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092548" comment="libpixman-1-0-32bit-0.28.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092549" comment="libpixman-1-0-devel-0.28.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092550" comment="pixman-0.28.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:228" version="1" class="patch">
	<metadata>
		<title>update for openssl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Fixed bnc#856687, openssl: crash when using TLS 1.2
  Add file: CVE-2013-6449.patch

- compression_methods_switch.patch: setenv might not be successful
  if a surrounding library or application filters it, like e.g. sudo.
  As setenv() does not seem to be useful anyway, remove it.
  bnc#849377
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092551" comment="libopenssl-devel-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092552" comment="libopenssl-devel-32bit-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092553" comment="libopenssl1_0_0-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092554" comment="libopenssl1_0_0-32bit-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092555" comment="openssl-1.0.1e-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092556" comment="openssl-doc-1.0.1e-1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:229" version="1" class="patch">
	<metadata>
		<title>nagios: fixed a denial of service in CGI executables</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

nagios was updated to fix a possible denial of service in CGI executables.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092557" comment="nagios-3.5.0-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092558" comment="nagios-devel-3.5.0-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092559" comment="nagios-www-3.5.0-2.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092560" comment="nagios-www-dch-3.5.0-2.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:230" version="1" class="patch">
	<metadata>
		<title>update for openssl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update of openssl fixes several security issues.

- Fixed bnc#857203, openssl: crash in DTLS renegotiation after packet loss
  Add file: CVE-2013-6450.patch

- Fixed bnc#856687, openssl: crash when using TLS 1.2
  Add file: CVE-2013-6449.patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092708" comment="libopenssl-devel-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092709" comment="libopenssl-devel-32bit-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092710" comment="libopenssl1_0_0-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092711" comment="libopenssl1_0_0-32bit-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092712" comment="openssl-1.0.1e-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092713" comment="openssl-doc-1.0.1e-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:231" version="1" class="patch">
	<metadata>
		<title>update for libqt4</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Fixes XML Entity Expansion Denial of Service (bnc#856832, CVE-2013-4549)
  * add backported patch libqt4-disallow-deep-or-widely-nested-entity-references.patch
  * add backported patch libqt4-fully-expand-all-entities.patch

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092935" comment="libqt4-devel-doc-4.8.4-3.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092936" comment="libqt4-devel-doc-data-4.8.4-3.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092937" comment="qt4-x11-tools-4.8.4-3.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092938" comment="libqt4-sql-mysql-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092939" comment="libqt4-sql-mysql-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092940" comment="libqt4-sql-plugins-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092941" comment="libqt4-sql-postgresql-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092942" comment="libqt4-sql-postgresql-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092943" comment="libqt4-sql-unixODBC-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092944" comment="libqt4-sql-unixODBC-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092945" comment="libqt4-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092946" comment="libqt4-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092947" comment="libqt4-devel-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092948" comment="libqt4-private-headers-devel-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092949" comment="libqt4-qt3support-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092950" comment="libqt4-qt3support-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092951" comment="libqt4-sql-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092952" comment="libqt4-sql-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092953" comment="libqt4-sql-sqlite-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092954" comment="libqt4-sql-sqlite-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092955" comment="libqt4-x11-32bit-4.8.4-3.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092956" comment="libqt4-x11-4.8.4-3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:232" version="1" class="patch">
	<metadata>
		<title>update for icinga</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- imported upstream version 1.10.2
  - includes fix for possible denial of service in CGI executables: CVE-2013-7108 (bnc#856837)
  * core: Add an Icinga syntax plugin for Vim #4150 - LE/MF
  * core: Document dropped options log_external_commands_user and event_profiling_enabled #4957 - BA
  * core: type in spec file on ido2db startup #5000 - MF
  * core: Build fails: xdata/xodtemplate.c requires stdint.h #5021 - SH
  * classic ui: fix status output in JSON format not including short and long plugin output properly #5217 - RB
  * classic ui: fix possible buffer overflows #5250 - RB
  * classic ui: fix Off-by-one memory access in process_cgivars() #5251 - RB
  * idoutils: idoutils oracle compile error #5059 - TD
  * idoutils: Oracle update script 1.10.0 failes while trying to drop nonexisting index #5256 - RB
- imported upstream version 1.10.1
  * core: add line number information to config verification error messages #4967 - GB
  * core/idoutils: revert check_source attribute due to mod_gearman manipulating in-memory checkresult list #4958 - MF
    ** classic ui/idoutils schema: functionality is kept only for Icinga 2 support
  * classic ui: fix context help on mouseover in cmd.cgi (Marc-Christian Petersen) #4971 - MF
  * classic ui: correction of colspan value in status.cgi (Bernd Arnold) #4961 - MF
  * idoutils: fix pgsql update script #4953 - AW/MF
  * idoutils: fix logentry_type being integer, not unsigned long (thx David Mikulksi) #4953 - MF

- fixed file permission of icingastats - bnc#851619  

- switch to all unhandled problems per default in index.html

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093009" comment="icinga-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093010" comment="icinga-devel-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093011" comment="icinga-doc-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093012" comment="icinga-idoutils-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093013" comment="icinga-idoutils-mysql-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093014" comment="icinga-idoutils-oracle-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093015" comment="icinga-idoutils-pgsql-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093016" comment="icinga-plugins-downtimes-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093017" comment="icinga-plugins-eventhandlers-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093018" comment="icinga-www-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093019" comment="monitoring-tools-1.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093020" comment="nagios-rpm-macros-0.08-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:233" version="1" class="patch">
	<metadata>
		<title>update for lightdm-gtk-greeter</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- add lightdm-gtk-greeter-handle-invalid-user.patch in order to fix
  a NULL pointer dereference after authentication of an invalid
  username has failed (bnc#857303, CVE-2014-0979)
- add lightdm-gtk-greeter-invalid-last_session.patch
  fix segfault when last_session is an invalid session (lp#1161883)
- add lightdm-gtk-greeter-fix-login.patch in order to fix
  login/unlock detection
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092957" comment="lightdm-gtk-greeter-1.3.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092958" comment="lightdm-gtk-greeter-branding-upstream-1.3.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092959" comment="lightdm-gtk-greeter-lang-1.3.1-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:234" version="1" class="patch">
	<metadata>
		<title>update for openssl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Fixed bnc#857640, openssl: TLS record tampering issue can lead to OpenSSL crash
  Add file: CVE-2013-4353.patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093021" comment="libopenssl-devel-1.0.1e-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093022" comment="libopenssl-devel-32bit-1.0.1e-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093023" comment="libopenssl1_0_0-1.0.1e-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093024" comment="libopenssl1_0_0-32bit-1.0.1e-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093025" comment="openssl-1.0.1e-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093026" comment="openssl-doc-1.0.1e-1.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:235" version="1" class="patch">
	<metadata>
		<title>update for libXfont</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- U_CVE-2013-6462-unlimited-sscanf-overflows-stack-buffe.patch 
  * unlimited sscanf overflows stack buffer in bdfReadCharacters()
   (CVE-2013-6462, bnc#854915) 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009092960" comment="libXfont-1.4.5-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092961" comment="libXfont-devel-1.4.5-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092962" comment="libXfont-devel-32bit-1.4.5-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092963" comment="libXfont1-1.4.5-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009092964" comment="libXfont1-32bit-1.4.5-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:236" version="1" class="patch">
	<metadata>
		<title>update for gnumeric</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Add gnumeric-CVE-2013-6836.patch: fix Heap-buffer-overflow in
  ms_escher_get_data on a fuzzed xls file (bnc#856254, bgo#712772,
  CVE-2013-6838).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093112" comment="gnumeric-1.12.0-2.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093113" comment="gnumeric-devel-1.12.0-2.4.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093114" comment="gnumeric-lang-1.12.0-2.4.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:237" version="1" class="patch">
	<metadata>
		<title>update for cups</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Hardening:

- cups-0002-systemd-listen-only-on-localhost-for-socket-activation.patch
  fixes the systemd cups.socket file so that systemd listens only
  on localhost (bnc#857372).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093059" comment="cups-1.5.4-5.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093060" comment="cups-client-1.5.4-5.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093061" comment="cups-ddk-1.5.4-5.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093062" comment="cups-devel-1.5.4-5.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093063" comment="cups-libs-1.5.4-5.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093064" comment="cups-libs-32bit-1.5.4-5.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:238" version="1" class="patch">
	<metadata>
		<title>update for hplip</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- fix-CVE-2013-6402.dif fixes hardcoded file name
  /tmp/hp-pkservice.log in pkit.py (bnc#852368).
- disable_hp-upgrade.patch disables hp-upgrade/upgrade.py for
  security reasons (bnc#853405). To upgrade HPLIP an openSUSE
  software package manager like YaST or zypper should be used.
  (CVE-2013-6427)

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093074" comment="hplip-3.12.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093075" comment="hplip-hpijs-3.12.11-2.9.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093076" comment="hplip-sane-3.12.11-2.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:239" version="1" class="patch">
	<metadata>
		<title>update for java-1_7_0-openjdk</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- Fix a file conflict between -devel and -headless package 

- Update to 2.4.4 (bnc#858818)
  * changed from xz to gzipped tarball as the first was not available
    during update
  * changed a keyring file due release manager change
    new one is signed by 66484681 from omajid@redhat.com, see
    http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2014-January/025800.html
* Security fixes
  - S6727821: Enhance JAAS Configuration
  - S7068126, CVE-2014-0373: Enhance SNMP statuses
  - S8010935: Better XML handling
  - S8011786, CVE-2014-0368: Better applet networking
  - S8021257, S8025022, CVE-2013-5896 : com.sun.corba.se.** should be on restricted package list
  - S8021271, S8021266, CVE-2014-0408: Better buffering in ObjC code
  - S8022904: Enhance JDBC Parsers
  - S8022927: Input validation for byte/endian conversions
  - S8022935: Enhance Apache resolver classes
  - S8022945: Enhance JNDI implementation classes
  - S8023057: Enhance start up image display
  - S8023069, CVE-2014-0411: Enhance TLS connections
  - S8023245, CVE-2014-0423: Enhance Beans decoding
  - S8023301: Enhance generic classes
  - S8023338: Update jarsigner to encourage timestamping
  - S8023672: Enhance jar file validation
  - S8024302: Clarify jar verifications
  - S8024306, CVE-2014-0416: Enhance Subject consistency
  - S8024530: Enhance font process resilience
  - S8024867: Enhance logging start up
  - S8025014: Enhance Security Policy
  - S8025018, CVE-2014-0376: Enhance JAX-P set up
  - S8025026, CVE-2013-5878: Enhance canonicalization
  - S8025034, CVE-2013-5907: Improve layout lookups
  - S8025448: Enhance listening events
  - S8025758, CVE-2014-0422: Enhance Naming management
  - S8025767, CVE-2014-0428: Enhance IIOP Streams
  - S8026172: Enhance UI Management
  - S8026176: Enhance document printing
  - S8026193, CVE-2013-5884: Enhance CORBA stub factories
  - S8026204: Enhance auth login contexts
  - S8026417, CVE-2013-5910: Enhance XML canonicalization
  - S8026502: java/lang/invoke/MethodHandleConstants.java fails on all platforms
  - S8027201, CVE-2014-0376: Enhance JAX-P set up
  - S8029507, CVE-2013-5893: Enhance JVM method processing
  - S8029533: REGRESSION: closed/java/lang/invoke/8008140/Test8008140.java fails agains
* Backports
  - S8025255: (tz) Support tzdata2013g
  - S8026826: JDK 7 fix for 8010935 broke the build
* Bug fixes
  - PR1618: Include defs.make in vm.make so VM_LITTLE_ENDIAN is defined on Zero builds
  - D729448: 32-bit alignment on mips and mipsel
  - PR1623: Collision between OpenJDK 6 &amp;amp; 7 classes when bootstrapping with OpenJDK 6
- Add update.py, helper script to download openjdk tarballs from hg repo

- Buildrequire quilt unconditionally as it's used unconditionally.
- Really disable tests on non-JIT architectures. (from Ulrich Weigand)

- Add headless subpackage wich does not require X and pulse/alsa
- Add accessibility to extra subpackage, which requires new
  java-atk-wrapper package
  * removed java-1.7.0-openjdk-java-access-bridge-idlj.patch
  * removed java-1.7.0-openjdk-java-access-bridge-tck.patch
  * removed java-access-bridge-1.26.2.tar.bz2
- Refreshed
  * java-1.7.0-openjdk-java-access-bridge-security.patch
- Add a support for running tests using --with tests
  * this is ignored on non-jit architectures
- Prefer global over define as bcond_with does use them
- Forward declare aarch64 arch macro
- Define archbuild/archinstall macros for arm and aarch64
  * remove a few ifarch conditions by using those macros in filelist

- Need ecj-bootstrap in bootstrap mode (noted by mmatz)
- Don't install vim and quilt in bootstrap mode

- A few enhancenments of bootstrap mode
  * usable wia --with bootstrap
  * disable docs, javadoc package
  * fix configure arguments on bootstrap

- Add the unversioned SDK directory link to the files list
  of -devel package (fixes update-alternatives from %post).

- Add support for bootstrapping with just gcj (using included
  ecj directly).  Increase stacksize for powerpc (amends
  java-1.7.0-openjdk-ppc-zero-jdk.patch).  Add support for ppc64le.

- fix stackoverflow for powerpc
  (java-1_7_0-openjdk-ppc-stackoverflow.patch) 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093226" comment="java-1_7_0-openjdk-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093227" comment="java-1_7_0-openjdk-accessibility-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093228" comment="java-1_7_0-openjdk-demo-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093229" comment="java-1_7_0-openjdk-devel-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093230" comment="java-1_7_0-openjdk-headless-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093231" comment="java-1_7_0-openjdk-javadoc-1.7.0.6-8.32.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093232" comment="java-1_7_0-openjdk-src-1.7.0.6-8.32.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:240" version="1" class="patch">
	<metadata>
		<title>update for tor</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- fixes potentially poor random number generation for users who 
  1) use OpenSSL 1.0.0 or later, 
  2) set &amp;quot;HardwareAccel 1&amp;quot; in their torrc file, 
  3) have &amp;quot;Sandy Bridge&amp;quot; or &amp;quot;Ivy Bridge&amp;quot; Intel processors
  and 
  4) have no state file in their DataDirectory (as would happen on
  first start). 
  Users who generated relay or hidden service identity keys in such
  a situation should discard them and generate new ones.
  No 2 is not the default configuration for openSUSE.
  [bnc#859421] [CVE-2013-7295]  
- added patches:
  * tor-0.2.3.x-CVE-2013-7295.patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093150" comment="tor-0.2.3.25-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:241" version="1" class="patch">
	<metadata>
		<title>poppler: fixed a denial of service problem</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

poppler was updated to fix a security issue:

- Fix a DoS due to a format string error (bnc#859427 CVE-2013-7296)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093374" comment="libpoppler-qt4-4-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093375" comment="libpoppler-qt4-devel-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093376" comment="poppler-qt-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093377" comment="libpoppler-cpp0-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093378" comment="libpoppler-devel-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093379" comment="libpoppler-glib-devel-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093380" comment="libpoppler-glib8-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093381" comment="libpoppler34-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093382" comment="poppler-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093383" comment="poppler-tools-0.22.1-1.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093384" comment="typelib-1_0-Poppler-0_18-0.22.1-1.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:242" version="1" class="patch">
	<metadata>
		<title>update for bind</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Update to version 9.9.4P2
  * Fixes named crash when handling malformed NSEC3-signed zones
    (CVE-2014-0591, bnc#858639)
  * Obsoletes workaround-compile-problem.diff
- Replace rpz2+rl-9.9.3-P1.patch by rpz2-9.9.4.patch, rl is now
  supported upstream (--enable-rrl).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093283" comment="bind-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093284" comment="bind-chrootenv-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093285" comment="bind-devel-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093286" comment="bind-doc-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093287" comment="bind-libs-32bit-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093288" comment="bind-libs-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093289" comment="bind-lwresd-9.9.4P2-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093290" comment="bind-utils-9.9.4P2-2.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:243" version="1" class="patch">
	<metadata>
		<title>QEMU accumulated security and maintenance updates</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Running QEMU in a configuration with more than 256 emulated SCSI devices attached could have caused a buffer overflow when the guest issues a REPORT LUNS command. Fix this as part of upgrading to the latest stable version on 13.1. Also fix unintentional building against gtk2 rather than gtk3 on 13.1, and fix serial retry logic on 12.3.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093291" comment="qemu-1.3.1-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093292" comment="qemu-guest-agent-1.3.1-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093293" comment="qemu-linux-user-1.3.1-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093294" comment="qemu-tools-1.3.1-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:244" version="1" class="patch">
	<metadata>
		<title>update for pidgin, pidgin-branding-openSUSE</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Update to version 2.10.8 (bnc#861019):
  + General: Python build scripts and example plugins are now
    compatible with Python 3 (pidgin.im#15624).
  + libpurple:
    - Fix potential crash if libpurple gets an error attempting to
      read a reply from a STUN server (CVE-2013-6484).
    - Fix potential crash parsing a malformed HTTP response
      (CVE-2013-6479).
    - Fix buffer overflow when parsing a malformed HTTP response
      with chunked Transfer-Encoding (CVE-2013-6485).
    - Better handling of HTTP proxy responses with negative
      Content-Lengths.
    - Fix handling of SSL certificates without subjects when
      using libnss.
    - Fix handling of SSL certificates with timestamps in the
      distant future when using libnss (pidgin.im#15586).
    - Impose maximum download size for all HTTP fetches.
  + Pidgin:
    - Fix crash displaying tooltip of long URLs (CVE-2013-6478).
    - Better handling of URLs longer than 1000 letters.
    - Fix handling of multibyte UTF-8 characters in smiley themes
      (pidgin.im#15756).
  + AIM: Fix untrusted certificate error.
  + AIM and ICQ: Fix a possible crash when receiving a malformed
    message in a Direct IM session.
  + Gadu-Gadu:
    - Fix buffer overflow with remote code execution potential.
      Only triggerable by a Gadu-Gadu server or a
      man-in-the-middle (CVE-2013-6487).
    - Disabled buddy list import/export from/to server.
    - Disabled new account registration and password change
      options.
  + IRC:
    - Fix bug where a malicious server or man-in-the-middle
      could trigger a crash by not sending enough arguments with
      various messages (CVE-2014-0020).
    - Fix bug where initial IRC status would not be set correctly.
    - Fix bug where IRC wasn't available when libpurple was
      compiled with Cyrus SASL support (pidgin.im#15517).
  + MSN:
    - Fix NULL pointer dereference parsing headers in MSN
      (CVE-2013-6482).
    - Fix NULL pointer dereference parsing OIM data in MSN
      (CVE-2013-6482).
    - Fix NULL pointer dereference parsing SOAP data in MSN
      (CVE-2013-6482).
    - Fix possible crash when sending very long messages. Not
      remotely-triggerable.
  + MXit:
    - Fix buffer overflow with remote code execution potential
      (CVE-2013-6487).
    - Fix sporadic crashes that can happen after user is
      disconnected.
    - Fix crash when attempting to add a contact via search
      results.
    - Show error message if file transfer fails.
    - Fix compiling with InstantBird.
    - Fix display of some custom emoticons.
  + SILC: Correctly set whiteboard dimensions in whiteboard
    sessions.
  + SIMPLE: Fix buffer overflow with remote code execution
    potential (CVE-2013-6487).
  + XMPP:
    - Prevent spoofing of iq replies by verifying that the
      'from' address matches the 'to' address of the iq request
      (CVE-2013-6483).
    - Fix crash on some systems when receiving fake delay
      timestamps with extreme values (CVE-2013-6477).
    - Fix possible crash or other erratic behavior when selecting a
      very small file for your own buddy icon.
    - Fix crash if the user tries to initiate a voice/video session
      with a resourceless JID.
    - Fix login errors when the first two available auth mechanisms
      fail but a subsequent mechanism would otherwise work when
      using Cyrus SASL (pidgin.im#15524).
    - Fix dropping incoming stanzas on BOSH connections when we
      receive multiple HTTP responses at once (pidgin.im#15684).
  + Yahoo!:
    - Fix possible crashes handling incoming strings that are not
      UTF-8 (CVE-2012-6152).
    - Fix a bug reading a peer to peer message where a remote user
      could trigger a crash (CVE-2013-6481).
  + Plugins:
    - Fix crash in contact availability plugin.
    - Fix perl function Purple::Network::ip_atoi.
    - Add Unity integration plugin.
  + Windows specific fixes: (CVE-2013-6486, pidgin.im#15520,
    pidgin.im#15521, bgo#668154).
- Drop pidgin-irc-sasl.patch, fixed upstream.

- Obsolete pidgin-facebookchat: the package is no longer maintained
  and pidgin as built-in support for Facebook Chat.

- Protect buildrequires for mono-devel with with_mono macro.

- Add pidgin-gstreamer1.patch: Port to GStreamer 1.0. Only enabled
  on openSUSE 13.1 and newer.
- On openSUSE 13.1 and newer, use gstreamer-devel and
  gstreamer-plugins-base-devel BuildRequires.

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093642" comment="bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093643" comment="libpurple-plugin-bot-sentry-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093644" comment="libpurple-plugin-bot-sentry-lang-1.3.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093645" comment="pidgin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093646" comment="pidgin-advanced-sound-notification-lang-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093647" comment="pidgin-plugin-advanced-sound-notification-1.2.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093648" comment="pidgin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093649" comment="pidgin-birthday-reminder-lang-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093650" comment="pidgin-plugin-birthday-reminder-1.7-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093651" comment="libpurple-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093652" comment="pidgin-branding-openSUSE-12.2-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093653" comment="pidgin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093654" comment="pidgin-plugin-embeddedvideo-1.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093655" comment="libpurple-plugin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093656" comment="pidgin-facebookchat-1.69-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093657" comment="pidgin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093658" comment="pidgin-guifications-lang-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093659" comment="pidgin-plugin-guifications-2.16-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093660" comment="libpurple-plugin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093661" comment="libpurple-plugin-mrim-lang-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093662" comment="pidgin-mrim-0.1.28-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093663" comment="libpurple-plugin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093664" comment="libpurple-plugin-openfetion-lang-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093665" comment="pidgin-openfetion-0.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093666" comment="pidgin-otr-4.0.0-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093667" comment="libpurple-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093668" comment="pidgin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093669" comment="telepathy-plugin-sipe-1.14.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093670" comment="finch-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093671" comment="finch-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093672" comment="libpurple-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093673" comment="libpurple-branding-upstream-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093674" comment="libpurple-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093675" comment="libpurple-lang-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093676" comment="libpurple-meanwhile-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093677" comment="libpurple-tcl-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093678" comment="pidgin-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093679" comment="pidgin-devel-2.10.9-4.10.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093680" comment="libpurple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093681" comment="libpurple-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093682" comment="pidgin-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093683" comment="pidgin-plugin-pack-extras-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093684" comment="purple-plugin-pack-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093685" comment="purple-plugin-pack-lang-2.7.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093686" comment="libpurple-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093687" comment="libpurple-plugin-skype-lang-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093688" comment="pidgin-plugin-skype-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093689" comment="skype4pidgin-0.0.1.rev624-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093690" comment="telepathy-haze-0.6.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:245" version="1" class="patch">
	<metadata>
		<title>kernel: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The Linux kernel was updated to fix various bugs and security issues:

- mm/page-writeback.c: do not count anon pages as dirtyable memory
  (reclaim stalls).
- mm/page-writeback.c: fix dirty_balance_reserve subtraction
  from dirtyable memory (reclaim stalls).

- compat_sys_recvmmsg X32 fix (bnc#860993 CVE-2014-0038).

- hwmon: (coretemp) Fix truncated name of alarm attributes

- net: fib: fib6_add: fix potential NULL pointer dereference
  (bnc#854173 CVE-2013-6431).

- keys: fix race with concurrent install_user_keyrings()
  (bnc#808358)(CVE-2013-1792).

- KVM: x86: Convert vapic synchronization to _cached functions
  (CVE-2013-6368) (bnc#853052 CVE-2013-6368).

- wireless: radiotap: fix parsing buffer overrun (bnc#854634
  CVE-2013-7027).

- KVM: x86: fix guest-initiated crash with x2apic (CVE-2013-6376)
  (bnc#853053 CVE-2013-6376).

- KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367)
  (bnc#853051 CVE-2013-6367).

- KVM: Improve create VCPU parameter (CVE-2013-4587) (bnc#853050
  CVE-2013-4587).

- staging: ozwpan: prevent overflow in oz_cdev_write() (bnc#849023
  CVE-2013-4513).

- perf/x86: Fix offcore_rsp valid mask for SNB/IVB (bnc#825006).
- perf/x86: Add Intel IvyBridge event scheduling constraints
  (bnc#825006).

- libertas: potential oops in debugfs (bnc#852559 CVE-2013-6378).

- aacraid: prevent invalid pointer dereference (bnc#852373
  CVE-2013-6380).

- staging: wlags49_h2: buffer overflow setting station name
  (bnc#849029 CVE-2013-4514).

- net: flow_dissector: fail on evil iph-&amp;gt;ihl (bnc#848079
  CVE-2013-4348).

- Staging: bcm: info leak in ioctl (bnc#849034 CVE-2013-4515).

- Refresh
  patches.fixes/net-rework-recvmsg-handler-msg_name-and-msg_namelen-logic.patch.

- ipv6: remove max_addresses check from ipv6_create_tempaddr
  (bnc#805226, CVE-2013-0343).

- net: rework recvmsg handler msg_name and msg_namelen logic
  (bnc#854722).

- crypto: ansi_cprng - Fix off by one error in non-block size
  request (bnc#840226).

- x6: Fix reserve_initrd so that acpi_initrd_override is reached
  (bnc#831836).
- Refresh other Xen patches.

- aacraid: missing capable() check in compat ioctl (bnc#852558).

- patches.fixes/gpio-ich-fix-ichx_gpio_check_available-return.patch: Update upstream reference

- perf/ftrace: Fix paranoid level for enabling function tracer
  (bnc#849362).

- xhci: fix null pointer dereference on
  ring_doorbell_for_active_rings (bnc#848255).
- xhci: Fix oops happening after address device timeout
  (bnc#848255).
- xhci: Ensure a command structure points to the correct trb on
  the command ring (bnc#848255).

- patches.arch/iommu-vt-d-remove-stack-trace-from-broken-irq-remapping-warning.patch:
  Update upstream reference.

- Allow NFSv4 username mapping to work properly (bnc#838024).

- Refresh btrfs attribute publishing patchset to match openSUSE-13.1
  No user-visible changes, but uses kobj_sysfs_ops and better kobject
  lifetime management.

- Fix a few incorrectly checked [io_]remap_pfn_range() calls
  (bnc#849021, CVE-2013-4511).

- drm/radeon: don't set hpd, afmt interrupts when interrupts
  are disabled.

- patches.fixes/cifs-fill-TRANS2_QUERY_FILE_INFO-ByteCount-fields.patch:
  Fix TRANS2_QUERY_FILE_INFO ByteCount fields (bnc#804950).

- iommu: Remove stack trace from broken irq remapping warning
  (bnc#844513).

- Disable patches related to bnc#840656
  patches.suse/btrfs-cleanup-don-t-check-the-same-thing-twice
  patches.suse/btrfs-0220-fix-for-patch-cleanup-don-t-check-the-same-thi.patch

- btrfs: use feature attribute names to print better error
  messages.
- btrfs: add ability to change features via sysfs.
- btrfs: add publishing of unknown features in sysfs.
- btrfs: publish per-super features to sysfs.
- btrfs: add per-super attributes to sysfs.
- btrfs: export supported featured to sysfs.
- kobject: introduce kobj_completion.
- btrfs: add ioctls to query/change feature bits online.
- btrfs: use btrfs_commit_transaction when setting fslabel.

- x86/iommu/vt-d: Expand interrupt remapping quirk to cover x58
  chipset (bnc#844513).

- NFSv4: Fix issues in nfs4_discover_server_trunking (bnc#811746).

- iommu/vt-d: add quirk for broken interrupt remapping on 55XX
  chipsets (bnc#844513).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093295" comment="kernel-debug-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093296" comment="kernel-debug-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093297" comment="kernel-debug-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093298" comment="kernel-default-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093299" comment="kernel-default-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093300" comment="kernel-default-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093301" comment="kernel-desktop-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093302" comment="kernel-desktop-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093303" comment="kernel-desktop-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093304" comment="kernel-docs-3.7.10-1.28.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093305" comment="kernel-ec2-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093306" comment="kernel-ec2-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093307" comment="kernel-ec2-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093308" comment="kernel-pae-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093309" comment="kernel-pae-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093310" comment="kernel-pae-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093311" comment="kernel-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093312" comment="kernel-source-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093313" comment="kernel-source-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093314" comment="kernel-syms-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093315" comment="kernel-trace-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093316" comment="kernel-trace-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093317" comment="kernel-trace-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093318" comment="kernel-vanilla-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093319" comment="kernel-vanilla-devel-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093320" comment="kernel-xen-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093321" comment="kernel-xen-base-3.7.10-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093322" comment="kernel-xen-devel-3.7.10-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:246" version="1" class="patch">
	<metadata>
		<title>Mozilla Firefox 27 release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Mozilla Firefox was updated to version 27.
Mozilla Seamonkey was updated to 2.24, fixing similar issues as Firefox 27.
Mozilla Thunderbird was updated to 24.3.0, fixing similar issues as Firefox 27.

The Firefox 27 release brings TLS 1.2 support as a major security feature.

It also fixes following security issues:
  * MFSA 2014-01/CVE-2014-1477/CVE-2014-1478
    Miscellaneous memory safety hazards (rv:27.0 / rv:24.3)
  * MFSA 2014-02/CVE-2014-1479 (bmo#911864)
    Clone protected content with XBL scopes
  * MFSA 2014-03/CVE-2014-1480 (bmo#916726)
    UI selection timeout missing on download prompts
  * MFSA 2014-04/CVE-2014-1482 (bmo#943803)
    Incorrect use of discarded images by RasterImage
  * MFSA 2014-05/CVE-2014-1483 (bmo#950427)
    Information disclosure with *FromPoint on iframes
  * MFSA 2014-06/CVE-2014-1484 (bmo#953993)
    Profile path leaks to Android system log
  * MFSA 2014-07/CVE-2014-1485 (bmo#910139)
    XSLT stylesheets treated as styles in Content Security Policy
  * MFSA 2014-08/CVE-2014-1486 (bmo#942164)
    Use-after-free with imgRequestProxy and image proccessing
  * MFSA 2014-09/CVE-2014-1487 (bmo#947592)
    Cross-origin information leak through web workers
  * MFSA 2014-10/CVE-2014-1489 (bmo#959531)
    Firefox default start page UI content invokable by script
  * MFSA 2014-11/CVE-2014-1488 (bmo#950604)
    Crash when using web workers with asm.js
  * MFSA 2014-12/CVE-2014-1490/CVE-2014-1491
    (bmo#934545, bmo#930874, bmo#930857)
    NSS ticket handling issues
  * MFSA 2014-13/CVE-2014-1481(bmo#936056)
    Inconsistent JavaScript handling of access to Window objects

Mozilla NSS was updated to 3.15.4:
  * required for Firefox 27
  * regular CA root store update (1.96)
  * Reordered the cipher suites offered in SSL/TLS client hello
    messages to match modern best practices.
  * Improved SSL/TLS false start. In addition to enabling the
    SSL_ENABLE_FALSE_START option, an application must now register
    a callback using the SSL_SetCanFalseStartCallback function.
  * When false start is enabled, libssl will sometimes return
    unencrypted, unauthenticated data from PR_Recv
    (CVE-2013-1740, bmo#919877)
  * MFSA 2014-12/CVE-2014-1490/CVE-2014-1491
    NSS ticket handling issues
  New functionality
  * Implemented OCSP querying using the HTTP GET method, which is
    the new default, and will fall back to the HTTP POST method.
  * Implemented OCSP server functionality for testing purposes
    (httpserv utility).
  * Support SHA-1 signatures with TLS 1.2 client authentication.
  * Added the --empty-password command-line option to certutil,
    to be used with -N: use an empty password when creating a new
    database.
  * Added the -w command-line option to pp: don't wrap long output
    lines.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093396" comment="MozillaFirefox-27.0-1.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093397" comment="MozillaFirefox-branding-upstream-27.0-1.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093398" comment="MozillaFirefox-buildsymbols-27.0-1.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093399" comment="MozillaFirefox-devel-27.0-1.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093400" comment="MozillaFirefox-translations-common-27.0-1.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093401" comment="MozillaFirefox-translations-other-27.0-1.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093402" comment="MozillaThunderbird-24.3.0-61.39.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093403" comment="MozillaThunderbird-buildsymbols-24.3.0-61.39.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093404" comment="MozillaThunderbird-devel-24.3.0-61.39.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093405" comment="MozillaThunderbird-translations-common-24.3.0-61.39.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093406" comment="MozillaThunderbird-translations-other-24.3.0-61.39.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093407" comment="enigmail-1.6.0+24.3.0-61.39.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093408" comment="libfreebl3-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093409" comment="libfreebl3-32bit-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093410" comment="libsoftokn3-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093411" comment="libsoftokn3-32bit-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093412" comment="mozilla-nss-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093413" comment="mozilla-nss-32bit-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093414" comment="mozilla-nss-certs-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093415" comment="mozilla-nss-certs-32bit-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093416" comment="mozilla-nss-devel-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093417" comment="mozilla-nss-sysinit-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093418" comment="mozilla-nss-sysinit-32bit-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093419" comment="mozilla-nss-tools-3.15.4-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093420" comment="seamonkey-2.24-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093421" comment="seamonkey-dom-inspector-2.24-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093422" comment="seamonkey-irc-2.24-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093423" comment="seamonkey-translations-common-2.24-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093424" comment="seamonkey-translations-other-2.24-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093425" comment="seamonkey-venkman-2.24-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:247" version="1" class="patch">
	<metadata>
		<title>chromium: security update to 32.0.1700.102</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Chromium was updated to version 32.0.1700.102:
  Stable channel update:
  - Security Fixes: 
    * CVE-2013-6649: Use-after-free in SVG images
    * CVE-2013-6650: Memory corruption in V8
    * and 12 other fixes
  - Other:
    * Mouse Pointer disappears after exiting full-screen mode
    * Drag and drop files into Chromium may not work properly
    * Quicktime Plugin crashes in Chromium
    * Chromium becomes unresponsive
    * Trackpad users may not be able to scroll horizontally
    * Scrolling does not work in combo box
    * Chromium does not work with all CSS minifiers such as 
      whitespace around a media query's `and` keyword

- Update to Chromium 32.0.1700.77
  Stable channel update:
  - Security fixes:
    * CVE-2013-6646: Use-after-free in web workers
    * CVE-2013-6641: Use-after-free related to forms
    * CVE-2013-6643: Unprompted sync with an attacker’s 
                     Google account
    * CVE-2013-6645: Use-after-free related to speech input 
                     elements
    * CVE-2013-6644: Various fixes from internal audits, fuzzing 
                     and other initiatives
  - Other:
    * Tab indicators for sound, webcam and casting 
    * Automatically blocking malware files 
    * Lots of under the hood changes for stability and performance 
- Remove patch chromium-fix-chromedriver-build.diff as that 
  chromedriver is fixed upstream

- Updated ExcludeArch to exclude aarch64, ppc, ppc64 and ppc64le. 
    This is based on missing build requires (valgrind, v8, etc)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093503" comment="chromedriver-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093504" comment="chromium-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093505" comment="chromium-desktop-gnome-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093506" comment="chromium-desktop-kde-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093507" comment="chromium-ffmpegsumo-32.0.1700.102-1.25.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093508" comment="chromium-suid-helper-32.0.1700.102-1.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:248" version="1" class="patch">
	<metadata>
		<title>update for curl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issues with curl:

- bnc#858673: re-use of wrong HTTP NTLM connection (CVE-2014-0015)
- bnc#862144: fix test failure because of an expired cookie
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093620" comment="curl-7.28.1-4.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093621" comment="libcurl-devel-7.28.1-4.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093622" comment="libcurl4-32bit-7.28.1-4.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093623" comment="libcurl4-7.28.1-4.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:249" version="1" class="patch">
	<metadata>
		<title>update for libyaml</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issue with libyaml:

- bnc#860617: Fixed heap based buffer overflow due to integer misuse (CVE-2013-6393)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093545" comment="libyaml-0-2-0.1.3-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093546" comment="libyaml-0.1.3-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093547" comment="libyaml-devel-0.1.3-11.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:250" version="1" class="patch">
	<metadata>
		<title>update for libvirt</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issues with libvirt:

- bnc#857492: Fix libvirtd crash when hot-plugging disks for qemu 
  domains (CVE-2013-6458)
- bnc#858817: Don't crash if a connection closes early (CVE-2014-1447)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093548" comment="libvirt-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093549" comment="libvirt-client-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093550" comment="libvirt-client-32bit-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093551" comment="libvirt-devel-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093552" comment="libvirt-devel-32bit-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093553" comment="libvirt-doc-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093554" comment="libvirt-lock-sanlock-1.0.2-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093555" comment="libvirt-python-1.0.2-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:251" version="1" class="patch">
	<metadata>
		<title>update for mumble</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This update fixes two security issues with mumble:

- bnc#862527: updated to version 1.2.5 to address two Denial of Service 
  security issues (CVE-2014-0044, CVE-2014-0045).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093556" comment="mumble-1.2.5-21.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093557" comment="mumble-32bit-1.2.5-21.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093558" comment="mumble-server-1.2.5-21.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:252" version="1" class="patch">
	<metadata>
		<title>update for icinga</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issue with icinga:

- bnc#859424: Fixed vulnerability against CSRF attacks (CVE-2013-7107).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093559" comment="icinga-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093560" comment="icinga-devel-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093561" comment="icinga-doc-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093562" comment="icinga-idoutils-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093563" comment="icinga-idoutils-mysql-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093564" comment="icinga-idoutils-oracle-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093565" comment="icinga-idoutils-pgsql-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093566" comment="icinga-plugins-downtimes-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093567" comment="icinga-plugins-eventhandlers-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093568" comment="icinga-www-1.10.2-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093569" comment="monitoring-tools-1.10.2-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:253" version="1" class="patch">
	<metadata>
		<title>icedtea-web: 1.4.2 bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

icedtea-web was updated to version 1.4.2 (bnc#864364),
fixing various bugs and a security issues:

* Dialogs center on screen before becoming visible
* Support for u45 new manifest attributes (Application-Name)
* Custom applet permission policies panel in itweb-settings control panel
* Plugin
  - PR1271: icedtea-web does not handle 'javascript:'-protocol URLs
  - RH976833: Multiple applets on one page cause deadlock
  - Enabled javaconsole
* Security Updates
  - CVE-2013-6493/RH1010958: insecure temporary file use flaw in LiveConnect implementation
* Except above also:
  - Christmas splashscreen extension
  - fixed classloading deadlocks
  - cleaned code from warnings
  - pipes moved to XDG runtime dir
* Patches changes:
  * rebased icedtea-web-1.1-moonlight-symbol-clash.patch
  * add icedtea-web-1.4.2-mkdir.patch
  * add icedtea-web-1.4.2-softkiller-link.patch
* build with rhino support
* use fdupes
* run make run-netx-dist-tests in %check on openSUSE &amp;gt; 13.1
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093691" comment="icedtea-web-1.4.2-4.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093692" comment="icedtea-web-javadoc-1.4.2-4.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:254" version="1" class="patch">
	<metadata>
		<title>subversion: security update to 1.7.16 to fix mod_dav_svn crash</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
 
Apache Subversion was updated to 1.7.16 [bnc#862459]
This release addresses one security issue:
CVE-2014-0032: mod_dav_svn DoS vulnerability with SVNListParentPath.
Affects servers with mod_dav_svn when configured on the root path
of the server and SVNListParentPath is on.

- Client-side bugfixes:
  * copy: fix some scenarios that broke the working copy
  * diff: fix regressions due to fixes in 1.7.14
- Server-side bugfixes:
  * mod_dav_svn: prevent crashes with SVNListParentPath on
   (CVE-2014-0032)
  * reduce memory usage during checkout and export
 Developer-visible changes:
  * fix failure in checkout_tests.py
  * support compiling against Cyrus sasl 2.1.25
  * support compiling against neon 0.30.x
- modified patches:
  * subversion-no-build-date.patch for context changes
- 1.7.15 was not released
- only require and build with junit when building with java and
    running regression tests
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093970" comment="libsvn_auth_gnome_keyring-1-0-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093971" comment="libsvn_auth_kwallet-1-0-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093972" comment="subversion-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093973" comment="subversion-bash-completion-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093974" comment="subversion-devel-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093975" comment="subversion-perl-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093976" comment="subversion-python-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093977" comment="subversion-server-1.7.16-2.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093978" comment="subversion-tools-1.7.16-2.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:255" version="1" class="patch">
	<metadata>
		<title>python-logilab-common: fixed multiple temp file problems</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The Python logilab-common module was updated to fix several 
temporary file problems, one in the PDF generator (CVE-2014-1838)
and one in the shellutils helper (CVE-2014-1839).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093693" comment="python-logilab-common-0.58.0-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093694" comment="python3-logilab-common-0.58.0-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:256" version="1" class="patch">
	<metadata>
		<title>rubygem-actionpack-3_2: fixed two security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

rubygem-actionpack-3_2 was updated to fix security issues:

- fix CVE-2014-0081: XSS Vulnerability in number_to_currency,
  number_to_percentage and number_to_human (bnc#864433) 
- fix CVE-2014-0082: Denial of Service Vulnerability in Action View
  when using render :text (bnc#864431)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093637" comment="rubygem-actionpack-3_2-3.2.12-1.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093638" comment="rubygem-actionpack-3_2-doc-3.2.12-1.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:257" version="1" class="patch">
	<metadata>
		<title>chromium: update to 33.0.1750.117 security and bugfix release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Chromium was updated to 33.0.1750.117 Stable channel update:
  - Security Fixes:
    * CVE-2013-6653: Use-after-free related to web contents
    * CVE-2013-6654: Bad cast in SVG
    * CVE-2013-6655: Use-after-free in layout
    * CVE-2013-6656: Information leak in XSS auditor
    * CVE-2013-6657: Information leak in XSS auditor
    * CVE-2013-6658: Use-after-free in layout
    * CVE-2013-6659: Issue with certificates validation in TLS 
                     handshake
    * CVE-2013-6660: Information leak in drag and drop
    * CVE-2013-6661: Various fixes from internal audits, fuzzing 
                     and other initiatives. Of these, seven are 
                     fixes for issues that could have allowed for 
                     sandbox escapes from compromised renderers.
  - Other:
    - Google Chrome Frame has been retired
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093940" comment="chromedriver-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093941" comment="chromium-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093942" comment="chromium-desktop-gnome-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093943" comment="chromium-desktop-kde-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093944" comment="chromium-ffmpegsumo-33.0.1750.117-1.29.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093945" comment="chromium-suid-helper-33.0.1750.117-1.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:258" version="1" class="patch">
	<metadata>
		<title>rubygems: fix applying rubygem patches correctly to the tree</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This update fixes the following issue with some rubygems:
- bnc#864873: fix rubygem patches are not applied to the gem but only to the tree. Packages embedding rubygems via their
.gem files were not receiving security updates.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093979" comment="rubygem-actionmailer-3_2-3.2.12-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093980" comment="rubygem-actionmailer-3_2-doc-3.2.12-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093981" comment="rubygem-actionpack-3_2-3.2.12-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093982" comment="rubygem-actionpack-3_2-doc-3.2.12-1.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093983" comment="rubygem-activerecord-3_2-3.2.12-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093984" comment="rubygem-activerecord-3_2-doc-3.2.12-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093985" comment="rubygem-activesupport-3_2-3.2.12-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093986" comment="rubygem-activesupport-3_2-doc-3.2.12-1.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:259" version="1" class="patch">
	<metadata>
		<title>xen: security and bugfix release to 4.2.4 c/s 26280</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Xen was updated to fix various bugs and security issues:

Update to Xen version 4.2.4 c/s 26280.

- bnc#861256 - CVE-2014-1950: xen: XSA-88: use-after-free in xc_cpupool_getinfo()
  under memory pressure. (fix included with update)

- bnc#863297: xend/pvscsi: recognize also SCSI CDROM devices

- bnc#858496 - CVE-2014-1642: Xen: XSA-83: Out-of-memory condition yielding memory
  corruption during IRQ setup

- bnc#860163 - xen: XSA-84: integer overflow in several
  XSM/Flask hypercalls (CVE-2014-1891 CVE-2014-1892 CVE-2014-1893 CVE-2014-1894)

- bnc#860165 - CVE-2014-1895: xen: XSA-85: Off-by-one error in
  FLASK_AVC_CACHESTAT hypercall

- bnc#860300 - CVE-2014-1896: xen: XSA-86: libvchan failure handling
  malicious ring indexes

- bnc#860302 - CVE-2014-1666: xen: XSA-87:
  PHYSDEVOP_{prepare,release}_msix exposed to unprivileged guests

- bnc#858311 - Server is not booting in kernel XEN after latest
  updates - (XEN) setup 0000:00:18.0 for d0 failed (-19)

- bnc#858496 - CVE-2014-1642: Xen: XSA-83: Out-of-memory condition yielding memory
  corruption during IRQ setup

- bnc#853049 - CVE-2013-6885: xen: XSA-82: Guest triggerable
  AMD CPU erratum may cause host hang

- bnc#853048 - CVE-2013-6400: xen: XSA-80: IOMMU TLB
  flushing may be inadvertently suppressed

- bnc#831120 - CVE-2013-2212: xen: XSA-60: Excessive time to
  disable caching with HVM guests with PCI passthrough

- bnc#848014 - [HP HPS] Xen hypervisor panics on 8-blades nPar with
  46-bit memory addressing

- bnc#833251 - [HP BCS SLES11 Bug]: In HPs UEFI x86_64 platform
  and with xen environment, in booting stage ,xen hypervisor will
  panic.

- pygrub: Support (/dev/xvda) style disk specifications

- bnc#849667 - CVE-2014-1895: xen: XSA-74: Lock order reversal between
  page_alloc_lock and mm_rwlock

- bnc#849668 - CVE-2013-4554: xen: XSA-76: Hypercalls exposed to privilege
  rings 1 and 2 of HVM guests

- bnc#842417 - In HPs UEFI x86_64 platform and sles11sp3 with xen
  environment, dom0 will soft lockup on multiple blades nPar.
- bnc#848014 - [HP HPS] Xen hypervisor panics on 8-blades nPar with
  46-bit memory addressing
- bnc#846849 - Soft lockup with PCI passthrough and many VCPUs
- bnc#833483 - Boot Failure with xen kernel in UEFI mode with error
  &amp;quot;No memory for trampoline&amp;quot;

- bnc#849665 - CVE-2013-4551: xen: XSA-75: Host crash due to
  guest VMX instruction execution

- The upstream version of checking for xend when using the 'xl'
  command is used is not working.

- bnc#840997 - It is possible to start a VM twice on the same node.

- bnc#848657 - xen: CVE-2013-4494: XSA-73: Lock order
  reversal between page allocation and grant table locks
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094648" comment="xen-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094649" comment="xen-devel-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094650" comment="xen-kmp-default-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094651" comment="xen-kmp-desktop-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094652" comment="xen-kmp-pae-4.2.4_02_k3.7.10_1.28-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094653" comment="xen-libs-32bit-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094654" comment="xen-libs-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094655" comment="xen-tools-domU-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094656" comment="xen-doc-html-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094657" comment="xen-doc-pdf-4.2.4_02-1.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094658" comment="xen-tools-4.2.4_02-1.26.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:260" version="1" class="patch">
	<metadata>
		<title>phpMyAdmin: update to 4.1.8</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

phpMyAdmin was updated to 4.1.8 to fix bugs, security issues and
also bring new features.

Fixed security issue:
  * PMASA-2014-1 ( CVE-2014-1879, CWE-661 CWE-79)

- update to 4.1.8 (2014-02-22)
  * sf#4276 Login loop on session expiry
  * sf#4249 Incorrect number of result rows for SQL with subqueries
  * sf#4275 Broken Link to php extension manual
  * sf#4053 List of procedures is not displayed after executing with Enter
  * sf#4081 Setup page content shifted to the right edge of its tabs
  * sf#4284 Reordering a column erases comments for other columns
  * sf#4286 Open &amp;quot;Browse&amp;quot; in a new tab
  * sf#4287 Printview - Always one column too much
  * sf#4288 Expand database (+ icon) after timeout doesn't do anything
  * sf#4285 Fixed CSS for setup
  * Fixed altering table to DOUBLE/FLOAT field
  * sf#4292 Success message and failure message being shown together
  * sf#4293 opening new tab (using selflink) for import.php based actions
          results in error and logout
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094013" comment="phpMyAdmin-4.1.8-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:261" version="1" class="patch">
	<metadata>
		<title>freeradius-server: fixed denial of service problem</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

FreeRadius received a security fix:

A denial of service in rlm_pap hash processing was fixed (CVE-2014-2015 bnc#864576)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094014" comment="freeradius-server-2.2.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094015" comment="freeradius-server-devel-2.2.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094016" comment="freeradius-server-dialupadmin-2.2.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094017" comment="freeradius-server-doc-2.2.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094018" comment="freeradius-server-libs-2.2.0-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094019" comment="freeradius-server-utils-2.2.0-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:262" version="1" class="patch">
	<metadata>
		<title>postgresql92: update to 9.2.7 security release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The PostgreSQL database was updated to the security and bugfix release
9.2.7, which following fixes:

* Shore up GRANT ... WITH ADMIN OPTION restrictions
  (CVE-2014-0060, bnc#864845)
* Prevent privilege escalation via manual calls to PL validator
  functions (CVE-2014-0061, bnc#864846)
* Avoid multiple name lookups during table and index DDL
  (CVE-2014-0062, bnc#864847)
* Prevent buffer overrun with long datetime strings
  (CVE-2014-0063, bnc#864850)
* Prevent buffer overrun due to integer overflow in size
  calculations (CVE-2014-0064, bnc#864851)
* Prevent overruns of fixed-size buffers (CVE-2014-0065,
  bnc#864852)
* Avoid crashing if crypt() returns NULL (CVE-2014-0066,
  bnc#864853)
* Document risks of make check in the regression testing
  instructions (CVE-2014-0067)
* For the other (many!) bug fixes, see the release notes:
  http://www.postgresql.org/docs/9.3/static/release-9-2-7.html
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094020" comment="libecpg6-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094021" comment="libecpg6-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094022" comment="libpq5-32bit-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094023" comment="libpq5-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094024" comment="postgresql92-devel-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094025" comment="postgresql92-libs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094026" comment="postgresql92-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094027" comment="postgresql92-contrib-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094028" comment="postgresql92-docs-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094029" comment="postgresql92-plperl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094030" comment="postgresql92-plpython-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094031" comment="postgresql92-pltcl-9.2.7-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094032" comment="postgresql92-server-9.2.7-1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:263" version="1" class="patch">
	<metadata>
		<title>fail2ban: security and bugfix upgrade to version 0.8.12</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The  fail2ban tool was updated to version 0.8.12 to fix various security issues
and also brings bugfixes and features.

Security issues fixed:
A remote unauthenticated attacker may cause arbitrary IP addresses to
be blocked by Fail2ban causing legitimate users to be blocked from accessing
services protected by Fail2ban. CVE-2013-7177 (cyrus-imap) and CVE-2013-7176
(postfix)

- Use new flushlogs syntax after logrotate

- Update to version 0.8.12
  * Log rotation can now occur with the command &amp;quot;flushlogs&amp;quot; rather than
    reloading fail2ban or keeping the logtarget settings consistent in
    jail.conf/local and /etc/logrotate.d/fail2ban. (dep#697333, rh#891798).
  * Added ignorecommand option for allowing dynamic determination as to ignore
    and IP or not.
  * Remove indentation of name and loglevel while logging to SYSLOG to resolve
    syslog(-ng) parsing problems. (dep#730202). Log lines now also
    report &amp;quot;[PID]&amp;quot; after the name portion too.
  * Epoch dates can now be enclosed within []
  * New actions: badips, firewallcmd-ipset, ufw, blocklist_de
  * New filters: solid-pop3d, nsd, openwebmail, horde, freeswitch, squid,
    ejabberd, openwebmail, groupoffice
  * Filter improvements:
    - apache-noscript now includes php cgi scripts
    - exim-spam filter to match spamassassin log entry for option SAdevnull.
    - Added to sshd filter expression for 
      &amp;quot;Received disconnect from : 3: Auth fail&amp;quot;
    - Improved ACL-handling for Asterisk
    - Added improper command pipelining to postfix filter.
  * General fixes:
    - Added lots of jail.conf entries for missing filters that creaped in 
      over the last year.
    - synchat changed to use push method which verifies whether all data was
      send. This ensures that all data is sent before closing the connection.
    - Fixed python 2.4 compatibility (as sub-second in date patterns weren't 
      2.4 compatible)
    - Complain/email actions fixed to only include relevant IPs to reporting
  * Filter fixes:
    - Added HTTP referrer bit of the apache access log to the apache filters.
    - Apache 2.4 perfork regexes fixed
    - Kernel syslog expression can have leading spaces
    - allow for &amp;quot;,milliseconds&amp;quot; in the custom date format of proftpd.log
    - recidive jail to block all protocols
    - smtps not a IANA standard so may be missing from /etc/services. Due to 
      (still) common use 465 has been used as the explicit port number
    - Filter dovecot reordered session and TLS items in regex with wider scope
      for session characters
  * Ugly Fixes (Potentially incompatible changes):
    - Unfortunately at the end of last release when the action
      firewall-cmd-direct-new was added it was too long and had a broken action
      check. The action was renamed to firewallcmd-new to fit within jail name
      name length. (gh#fail2ban/fail2ban#395).
    - Last release added mysqld-syslog-iptables as a jail configuration. This
      jailname was too long and it has been renamed to mysqld-syslog.
- Fixed formating of github references in changelog
- reformatted spec-file
 

- Update to version 0.8.11
- In light of CVE-2013-2178 that triggered our last release we have put a
  significant effort into tightening all of the regexs of our filters to avoid
  another similar vulnerability. We haven't examined all of these for a potential
  DoS scenario however it is possible that another DoS vulnerability exists that
  is fixed by this release. A large number of filters have been updated to
  include more failure regexs supporting previously unbanned failures and support
  newer application versions too. We have test cases for most of these now
  however if you have other examples that demonstrate that a filter is
  insufficient we welcome your feedback. During the tightening of the regexs to
  avoid DoS vulnerabilities there is the possibility that we have inadvertently,
  despite our best intentions, incorrectly allowed a failure to continue.

    Addresses a possible DoS. Closes gh#fail2ban/fail2ban#248, bnc#824710
    within [Init].  Closes gh#fail2ban/fail2ban#232
  * Updates to asterisk filter. Closes gh#fail2ban/fail2ban#227,
    gh#fail2ban/fail2ban#230.
  * Updates to asterisk to include AUTH_UNKNOWN_DOMAIN. Closes 
    gh#fail2ban/fail2ban#244.
     on Fedora. Closes gh#fail2ban/fail2ban#112. Thanks to Camusensei for the
     bug report.
     insight. Closes gh#fail2ban/fail2ban#103.
   * [f2156604] pyinotify -- monitor IN_MOVED_TO events. Closes
     gh#fail2ban/fail2ban#184. Thanks to Jon Foster for report and
     troubleshooting.  Orion Poplawski
   * [39667ff6] Avoid leaking file descriptors. Closes gh#fail2ban/fail2ban#167.
     Closes gh#fail2ban/fail2ban#147, gh#fail2ban/fail2ban#148.
   * [b6a68f51] Fix delaction on server side. Closes gh#fail2ban/fail2ban#124.
     the fail2ban-client. Closes gh#fail2ban/fail2ban#134.
     gh#fail2ban/fail2ban#70. Thanks to iGeorgeX for the idea.
   * [96eb8986] ' and &amp;quot; should also be escaped in action tags Closes 
     gh#fail2ban/fail2ban#109
     beilber for the idea. Closes gh#fail2ban/fail2ban#114.
     fail2ban is running. Closes gh#fail2ban/fail2ban#166.
   * [29d0df5] Add mysqld filter. Closes gh#fail2ban/fail2ban#152.
   * [bba3fd8] Add Sogo filter. Closes gh#fail2ban/fail2ban#117.
   * [be06b1b] Add action for iptables-ipsets. Closes gh#fail2ban/fail2ban#102.
   * [f336d9f] Add filter for webmin. Closes gh#fail2ban/fail2ban#99.
     consistently. Closes gh#fail2ban/fail2ban#172.
   * [b36835f] Add get cinfo to fail2ban-client. Closes gh#fail2ban/fail2ban#124.
     Closes gh#fail2ban/fail2ban#142.
     Closes gh#fail2ban/fail2ban#126. Bug report by Michael Heuberger.
   * [3aeb1a9] Add jail.conf manual page. Closes gh#fail2ban/fail2ban#143.
     banning due to misconfigured DNS. Close gh#fail2ban/fail2ban#64
   * [0935566,5becaf8] Various python 2.4 and 2.5 compatibility fixes. 
     Close gh#fail2ban/fail2ban#83
     in the console. Close gh#fail2ban/fail2ban#91
     the log file to take 'banip' or 'unbanip' in effect. 
     Close gh#fail2ban/fail2ban#81, gh#fail2ban/fail2ban#86
   * [f52ba99] downgraded &amp;quot;already banned&amp;quot; from WARN to INFO level.
     Closes gh#fail2ban/fail2ban#79
     for this gh#fail2ban/fail2ban#87)
    message stays non-unicode. Close gh#fail2ban/fail2ban#32
    friend to developers stuck with Windows (Closes gh#fail2ban/fail2ban#66)
    repeated offenders. Close gh#fail2ban/fail2ban#19
    Close gh#fail2ban/fail2ban#47 (Closes: #669063)
    		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094033" comment="fail2ban-0.8.12-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:264" version="1" class="patch">
	<metadata>
		<title>gnutls: fixed SSL certificate validation</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The gnutls library was updated to fix SSL certificate validation. Remote man-in-the-middle attackers
were able to make the verification believe that a SSL certificate is valid even though it was not.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009093946" comment="gnutls-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093947" comment="libgnutls-devel-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093948" comment="libgnutls-devel-32bit-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093949" comment="libgnutls-openssl-devel-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093950" comment="libgnutls-openssl27-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093951" comment="libgnutls28-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093952" comment="libgnutls28-32bit-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093953" comment="libgnutlsxx-devel-3.0.28-1.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009093954" comment="libgnutlsxx28-3.0.28-1.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:265" version="1" class="patch">
	<metadata>
		<title>file: security fixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

file was updated to fix two security issues.

- A possible endless recursion. (CVE-2014-1943)
- A crash in PE file handling (CVE-2014-2270)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094178" comment="file-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094179" comment="file-devel-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094180" comment="libmagic-data-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094181" comment="libmagic1-32bit-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094182" comment="libmagic1-5.11-12.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094183" comment="python-magic-5.11-12.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:266" version="1" class="patch">
	<metadata>
		<title>roundcubemail: update to 0.9.5</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

roundcubemail was updated to 0.9.5 to fix bugs and security issues.

Fixed security issues:
  * CVE-2013-6172: vulnerability in handling _session argument of utils/save-prefs

New upstream release 0.9.5 (bnc#847179) (CVE-2013-6172)
  * Fix failing vCard import when email address field contains spaces
  * Fix default spell-check configuration after Google suspended their spell service
  * Fix vulnerability in handling _session argument of utils/save-prefs
  * Fix iframe onload for upload errors handling
  * Fix address matching in Return-Path header on identity selection
  * Fix text wrapping issue with long unwrappable lines
  * Fixed mispelling: occured -&amp;gt; occurred
  * Fixed issues where HTML comments inside style tag would hang Internet Explorer
  * Fix setting domain in virtualmin password driver
  * Hide Delivery Status Notification option when smtp_server is unset
  * Display full attachment name using title attribute when name is too long to display
  * Fix attachment icon issue when rare font/language is used
  * Fix expanded thread root message styling after refreshing messages list
  * Fix issue where From address was removed from Cc and Bcc fields when editing a draft
  * Fix error_reporting directive check
  * Fix de_DE localization of &amp;quot;About&amp;quot; label in Help plugin

  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094428" comment="php5-pear-Net_IDNA2-0.1.1-5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094429" comment="roundcubemail-0.9.5-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:267" version="1" class="patch">
	<metadata>
		<title>libssh: reseed randomness on forking server instances</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

libssh was updated to fix a random generator reseeding issue
when forking multiple servers. Forking multiple servers might
under some circumstances get them the same random seed state.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094359" comment="libssh-0.5.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094360" comment="libssh-devel-0.5.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094361" comment="libssh-devel-doc-0.5.3-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094362" comment="libssh4-0.5.3-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:268" version="1" class="patch">
	<metadata>
		<title>otrs: security and bugfix update to 3.1.20/3.2.15</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The OTRS ticket system was updated to 3.1.20 / 3.2.15:

On openSUSE 12.3 it was updated to 3.1.20:
  (fix for OSA-2014-03, CVE-2014-1695)
  * Improved HTML filter.
 - 3.1.19 2014-01-28
   * Fixed bug#10158 - Missing quoting in State::StateGetStatesByType().
   * Fixed bug#10099 - Missing challenge token checks on customer interface.
   * Fixed bug#8489 - setting Tickets per page resets AgentTicketQueue.
   * Fixed bug#9661 - Useless code in DynamicField backend.
   * Fixed bug#9622 - Actions in Small ticket overview don't work when cookies
      are turned off.
   * Fixed bug#9541 - Package manager cannot use https proxy.
   * Fixed bug#9594 - No auto-reply sent with multiple From addresses in
      AgentTicketPhone on PostgreSQL and Oracle.
   * Fixed bug#3434 - Validity of search time frame not checked by OTRS.
   * Fixed bug#9596 - On merge and bounce screens is confusing when fill or not
      'To', 'Subject' and 'Body' fields.
   * Fixed bug#9595 - Incomplete page reload handling in merge and bounce.
   * Fixed bug#3007 - CheckMXRecord and CheckEmailAddresses have no effect on
      AgentTicketBounce.
   * Fixed bug#9512 - Database error for invalid date in AgentTicketSearch.
   * Fixed bug#8835 - No article found for TicketID &amp;lt;TICKET ID&amp;gt; when showing
      group tickets
   * Fixed bug#9583 - Dynamic Fields of type Date have timestamp in notifications.
   * Fixed bug#9579 - SOAP Serializer used in Kernel/GenericInterface/Transport/
      HTTP/SOAP.pm does not correctly set namespace.
   * Fixed bug#7359 - Setting pending states via generic agent does not set
      pending time.
   * Fixed bug#8380 - Middle name not displayed in AdminCustomerUser.
   * Fixed bug#9576 - GI TicketSearch Date and Date/Time dynamic fields are
      ignored.
   * Changed Dynamic Field SearchFieldParameterBuild() API, LayoutObject is now
      optional.
   * Fixed bug#9573 - Date and DateTime dynamic fields not considered in
      GenericAgent Jobs.

On openSUSE 13.1 it was updated to 3.2.15:
  (fix for OSA-2014-03, CVE-2014-1695)
  * Improved HTML filter.
  * Fixed bug#10207 - DynamicField Search-Function in CustomerFrontend is not
     working.
  * Followup for bug#9011 - New value after value mapping can't be 0.
  * Fixed bug#10214 - Value &amp;quot;0&amp;quot; for DynamicsFields prevents TicketCreation.
  * Fixed bug#9616 - Too long activities and transitions are not displayed
     correctly.
  * Fixed bug#10212 - My tickets &amp;amp; Company tickets in 3.3.4.
  * Fixed bug#10205 - GenericInterface: Mandatory TimeUnits can't be 0.
  * Fixed bug#10196 - Ticket merge action does not notify the owner of the
     existing ticket.
  * Fixed bug#9692 - On PhoneOutbound articles, the FROM field shows Customer
     ID instead Agent ID.
  * Fixed bug#10189 - ProcessManagement: Use article subject if no ticket title
     is set.
  * Fixed bug#9654 - TicketUpdate operation doesn't work when authenticated as
     a customer.
  * Fixed bug#10137 - Generic interface TicketCreate operation doesn't work
     when authenticated as a customer.
- 3.2.14
  * Fixed bug#10172 - Can't create process tickets with disabled richtext.
  * Fixed bug#10121 - QQMails break in OTRS.
  * Fixed bug#10158 - Missing quoting in State::StateGetStatesByType().
  * Fixed bug#8969 - FAQ module Language files installation fails
     (Kernel/Language permissions).
  * Fixed bug#9959 - &amp;amp; breaks ExpandCustomerName.
  * Fixed bug#10099 - Missing challenge token checks on customer interface.
  * Fixed bug#10103 - ArticleTypeID is always undef in AgentTicketCompose.
  * Added functionality to disable access to tickets of other customers with
     the same customer company in customer interface.
  * Fixed bug#9650 - Special character in customer id breaks Open Tickets in
     AgentTicketZoom.
  * Fixed bug#9723 - TicketAccountedTime stat does not run on Oracle with many
     tickets
  * Fixed bug#10077 - regular expressions in postmaster filter return 1 if no
     regex match.
  * Fixed bug#10070 - Wrong error message if Transition contains no transition
     actions. 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094116" comment="otrs-3.1.20-26.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094117" comment="otrs-doc-3.1.20-26.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094118" comment="otrs-itsm-3.1.10-26.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:269" version="1" class="patch">
	<metadata>
		<title>percona-toolkit: fixed version check security issue</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

percona-toolkit was updated to 2.1.11 [bnc#864194] CVE-2014-2029

This improves sanitisation of input and output for commands run when
performing a version check. This option is not the default.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094119" comment="percona-toolkit-2.1.11-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:270" version="1" class="patch">
	<metadata>
		<title>ImageMagick: fixed buffer overflow in PSD image handling</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

ImageMagick was updated to fix a buffer overflow in handling
of PSD images.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094363" comment="ImageMagick-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094364" comment="ImageMagick-devel-32bit-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094365" comment="ImageMagick-devel-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094366" comment="ImageMagick-doc-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094367" comment="ImageMagick-extra-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094368" comment="libMagick++-devel-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094369" comment="libMagick++5-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094370" comment="libMagickCore5-32bit-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094371" comment="libMagickCore5-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094372" comment="libMagickWand5-32bit-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094373" comment="libMagickWand5-6.7.8.8-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094374" comment="perl-PerlMagick-6.7.8.8-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:271" version="1" class="patch">
	<metadata>
		<title>wireshark: security update to 1.8.13/1.10.6</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Wireshark was updated to version 1.8.13 on openSUSE 12.3
and 1.10.6 on openSUSE 13.1 to fix security issues and bugs.

Wireshark update to 1.8.13 [bnc#867485]
  + vulnerabilities fixed:
    * The NFS dissector could crash
      wnpa-sec-2014-01 CVE-2014-2281
    * The RLC dissector could crash
      wnpa-sec-2014-03 CVE-2014-2283
    * The MPEG file parser could overflow a buffer
      wnpa-sec-2014-04 CVE-2014-2299
  + Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.8.13.html

Wireshark update to 1.10.6 [bnc#867485] 
  + vulnerabilities fixed:
    * The NFS dissector could crash
      wnpa-sec-2014-01 CVE-2014-2281
    * The M3UA dissector could crash
      wnpa-sec-2014-02 CVE-2014-2282
    * The RLC dissector could crash
      wnpa-sec-2014-03 CVE-2014-2283
    * The MPEG file parser could overflow a buffer
      wnpa-sec-2014-04 CVE-2014-2299
  + Further bug fixes and updated protocol support as listed in:
    https://www.wireshark.org/docs/relnotes/wireshark-1.10.6.html
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094184" comment="wireshark-1.8.13-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094185" comment="wireshark-devel-1.8.13-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:272" version="1" class="patch">
	<metadata>
		<title>libyaml: fixed regression in previous security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

libyaml was updated to fix a regression introduced by the previous
security patch for CVE-2013-6393.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094186" comment="libyaml-0-2-0.1.3-11.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094187" comment="libyaml-0.1.3-11.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094188" comment="libyaml-devel-0.1.3-11.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:273" version="1" class="patch">
	<metadata>
		<title>udisks: fixed a buffer overflow</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

udisks was updated to fix a buffer overflow in mount path parsing.

If users have the possibility to create very long mount points, such as with
FUSE, they could cause udisksd to crash, or even to run arbitrary
code as root with specially crafted mount paths.
(bnc#865854, CVE-2014-0004)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094189" comment="udisks-1.0.4-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094190" comment="udisks-devel-1.0.4-11.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:274" version="1" class="patch">
	<metadata>
		<title>udisks2: fixed buffer overflow in mountpoint parsing</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

udisks2 was updated to fix a buffer overflow in mount path parsing. If users have
the possibility to create very long mount points, such as with
FUSE, they could cause udisksd to crash, or even to run arbitrary
code as root with specially crafted mount paths.
(bnc#865854, CVE-2014-0004)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094191" comment="libudisks2-0-2.0.0-5.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094192" comment="typelib-1_0-UDisks-2_0-2.0.0-5.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094193" comment="udisks2-2.0.0-5.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094194" comment="udisks2-devel-2.0.0-5.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094195" comment="udisks2-lang-2.0.0-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:275" version="1" class="patch">
	<metadata>
		<title>net-snmp: security fixes for remote denial of service problems</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

net-snmp was updated to fix potential remote denial of service problems:

- fixed a potential remote denial of service problem within the Linux
  ICMP-MIB implementation (CVE-2014-2284)(bnc#866942)

- fixed a potential remote denial of service problem inside the snmptrapd
  Perl trap handler (CVE-2014-2285)(bnc#866942)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094229" comment="libsnmp30-32bit-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094230" comment="libsnmp30-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094231" comment="net-snmp-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094232" comment="net-snmp-devel-32bit-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094233" comment="net-snmp-devel-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094234" comment="perl-SNMP-5.7.2-3.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094235" comment="snmp-mibs-5.7.2-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:276" version="1" class="patch">
	<metadata>
		<title>libjansson: fixed denial of service problem in hash table</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
libjansson was updated to fix a hash table collission CPU usage denial of service issue,
  when an attacker can supply his own JSON file.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094236" comment="libjansson-2.3.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094237" comment="libjansson-devel-2.3.1-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094238" comment="libjansson4-2.3.1-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:277" version="1" class="patch">
	<metadata>
		<title>samba: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Samba was updated to fix security issues and bugs:

Security issues fixed:
- Password lockout was not enforced for SAMR password changes, this allowed brute force attacks on passwords.
  CVE-2013-4496; (bnc#849224).

- The DCE-RPC fragment length field is incorrectly checked, which could expose samba clients to
  buffer overflow exploits caused by malicious servers; CVE-2013-4408; (bnc#844720).

- The pam_winbind login without require_membership_of restrictions could allow fallbacks to local
  users even if they were not intended to be allowed; CVE-2012-6150; (bnc#853347).

Also non security bugs were fixed:
- Fix problem with server taking too long to respond to a
  MSG_PRINTER_DRVUPGRADE message; (bso#9942); (bnc#863748).

- Fix memory leak in printer_list_get_printer(); (bso#9993); (bnc#865561).

- Depend on %version-%release with all manual Provides and Requires;
  (bnc#844307).

- Remove superfluous obsoletes *-64bit in the ifarch ppc64 case; (bnc#437293).

- Fix Winbind 100% CPU utilization caused by domain list corruption;
  (bso#10358); (bnc#786677).

- Samba is chatty about being unable to open a printer; (bso#10118).
- nsswitch: Fix short writes in winbind_write_sock; (bso#10195).
- xattr: fix listing EAs on *BSD for non-root users; (bso#10247).
- spoolss: accept XPS_PASS datatype used by Windows 8; (bso#10267).
- The preceding bugs are tracked by (bnc#854520) too.


- Make use of the full gpg pub key file name including the key ID.

- Remove bogus libsmbclient0 package description and cleanup the libsmbclient
  line from baselibs.conf; (bnc#853021).

- Allow smbcacls to take a '--propagate-inheritance' flag to indicate that
  the add, delete, modify and set operations now support automatic
  propagation of inheritable ACE(s); (FATE#316474).

- Attempt to use samlogon validation level 6; (bso#7945); (bnc#741623).

- Recover from ncacn_ip_tcp ACCESS_DENIED/SEC_PKG_ERROR lsa errors;
  (bso#7944); (bnc#755663).
- Fix lsa_LookupSids3 and lsa_LookupNames4 arguments.


- Use simplified smb signing infrastructure; (bnc#741623).		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094251" comment="samba-doc-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094252" comment="libnetapi-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094253" comment="libnetapi0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094254" comment="libsmbclient-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094255" comment="libsmbclient0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094256" comment="libsmbclient0-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094257" comment="libsmbsharemodes-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094258" comment="libsmbsharemodes0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094259" comment="libwbclient-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094260" comment="libwbclient0-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094261" comment="libwbclient0-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094262" comment="samba-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094263" comment="samba-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094264" comment="samba-client-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094265" comment="samba-client-32bit-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094266" comment="samba-devel-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094267" comment="samba-krb-printing-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094268" comment="samba-winbind-3.6.12-59.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094269" comment="samba-winbind-32bit-3.6.12-59.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:278" version="1" class="patch">
	<metadata>
		<title>icinga: fixed potential buffer overflows</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The monitoring system icinga received security fixes in the cgi helpers where buffers could be
overflowed by 1 byte. Note that this will be caught by the FORTIFY_SOURCE static overflow detection.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094430" comment="icinga-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094431" comment="icinga-devel-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094432" comment="icinga-doc-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094433" comment="icinga-idoutils-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094434" comment="icinga-idoutils-mysql-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094435" comment="icinga-idoutils-oracle-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094436" comment="icinga-idoutils-pgsql-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094437" comment="icinga-plugins-downtimes-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094438" comment="icinga-plugins-eventhandlers-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094439" comment="icinga-www-1.10.2-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094440" comment="monitoring-tools-1.10.2-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:279" version="1" class="patch">
	<metadata>
		<title>perl-HTTP-Body: update to 1.19 release with security fixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

perl-HTTP-Body was updated to 1.19 and also received
a security fix for a potential remote code injection when upload files.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094469" comment="perl-HTTP-Body-1.19-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:280" version="1" class="patch">
	<metadata>
		<title>mutt: fixed remote triggerable crash in header view</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The mailreader mutt was updated to fix a crash in header view that
could be triggered by malformed e-mails and potentially be used to
execute code.
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094470" comment="mutt-1.5.21-36.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:281" version="1" class="patch">
	<metadata>
		<title>file: fixed off-by-one errors</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The file magic scanning tool/library was updated to fix a off-by-one error in the
last security fixes.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094471" comment="file-5.11-12.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094472" comment="file-devel-5.11-12.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094473" comment="libmagic-data-5.11-12.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094474" comment="libmagic1-32bit-5.11-12.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094475" comment="libmagic1-5.11-12.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094476" comment="python-magic-5.11-12.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:282" version="1" class="patch">
	<metadata>
		<title>lighttpd: security update to 1.4.35</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

lighttpd was updated to version 1.4.35, fixing bugs and security issues:

CVE-2014-2323: SQL injection vulnerability in mod_mysql_vhost.c in
lighttpd allowed remote attackers to execute arbitrary SQL commands via
the host name, related to request_check_hostname.

CVE-2014-2323: Multiple directory traversal vulnerabilities in (1)
mod_evhost and (2) mod_simple_vhost in lighttpd allowed remote attackers
to read arbitrary files via a .. (dot dot) in the host name, related
to request_check_hostname.

More information can be found on the lighttpd advisory page:
http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt 

Other changes:
* [network/ssl] fix build error if TLSEXT is disabled
* [mod_fastcgi] fix use after free (only triggered if fastcgi
  debug is active)
* [mod_rrdtool] fix invalid read (string not null terminated)
* [mod_dirlisting] fix memory leak if pcre fails
* [mod_fastcgi,mod_scgi] fix resource leaks on spawning backends
* [mod_magnet] fix memory leak
* add comments for switch fall throughs
* remove logical dead code
* [buffer] fix length check in buffer_is_equal_right_len
* fix resource leaks in error cases on config parsing and other
  initializations
* add force_assert() to enforce assertions as simple assert()s
  are disabled by -DNDEBUG (fixes #2546)
* [mod_cml_lua] fix null pointer dereference
* force assertion: setting FD_CLOEXEC must work (if available)
* [network] check return value of lseek()
* fix unchecked return values from
  stream_open/stat_cache_get_entry
* [mod_webdav] fix logic error in handling file creation error
* check length of unix domain socket filenames
* fix SQL injection / host name validation (thx Jann Horn)
  for all the changes see /usr/share/doc/packages/lighttpd/NEWS
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094485" comment="lighttpd-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094486" comment="lighttpd-mod_cml-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094487" comment="lighttpd-mod_geoip-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094488" comment="lighttpd-mod_magnet-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094489" comment="lighttpd-mod_mysql_vhost-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094490" comment="lighttpd-mod_rrdtool-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094491" comment="lighttpd-mod_trigger_b4_dl-1.4.35-6.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094492" comment="lighttpd-mod_webdav-1.4.35-6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:283" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox: Update to version 28.0</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Mozilla Firefox was updated to version 28.0, receiving enhancements, bug and security fixes.
Mozilla NSPR was updated to 4.10.4 receiving enhancements, bug and security fixes.
Mozilla NSS  was updated to 3.15.5 receiving enhancements, bug and security fixes.

Changes in MozillaFirefox:
- update to Firefox 28.0 (bnc#868603)
  * MFSA 2014-15/CVE-2014-1493/CVE-2014-1494
    Miscellaneous memory safety hazards
  * MFSA 2014-17/CVE-2014-1497 (bmo#966311)
    Out of bounds read during WAV file decoding
  * MFSA 2014-18/CVE-2014-1498 (bmo#935618)
    crypto.generateCRMFRequest does not validate type of key
  * MFSA 2014-19/CVE-2014-1499 (bmo#961512)
    Spoofing attack on WebRTC permission prompt
  * MFSA 2014-20/CVE-2014-1500 (bmo#956524)
    onbeforeunload and Javascript navigation DOS
  * MFSA 2014-22/CVE-2014-1502 (bmo#972622)
    WebGL content injection from one domain to rendering in another
  * MFSA 2014-23/CVE-2014-1504 (bmo#911547)
    Content Security Policy for data: documents not preserved by
    session restore
  * MFSA 2014-26/CVE-2014-1508 (bmo#963198)
    Information disclosure through polygon rendering in MathML
  * MFSA 2014-27/CVE-2014-1509 (bmo#966021)
    Memory corruption in Cairo during PDF font rendering
  * MFSA 2014-28/CVE-2014-1505 (bmo#941887)
    SVG filters information disclosure through feDisplacementMap
  * MFSA 2014-29/CVE-2014-1510/CVE-2014-1511 (bmo#982906, bmo#982909)
    Privilege escalation using WebIDL-implemented APIs
  * MFSA 2014-30/CVE-2014-1512 (bmo#982957)
    Use-after-free in TypeObject
  * MFSA 2014-31/CVE-2014-1513 (bmo#982974)
    Out-of-bounds read/write through neutering ArrayBuffer objects
  * MFSA 2014-32/CVE-2014-1514 (bmo#983344)
    Out-of-bounds write through TypedArrayObject after neutering
- requires NSPR 4.10.3 and NSS 3.15.5
- new build dependency (and recommends):
  * libpulse
  * JS math correctness issue (bmo#941381)

Changes in mozilla-nspr:
- update to version 4.10.4
  * bmo#767759: Add support for new x32 abi
  * bmo#844784: Thread data race in PR_EnterMonitor
  * bmo#939786: data race nsprpub/pr/src/pthreads/ptthread.c:137 _pt_root
  * bmo#958796: Users of _beginthreadex that set a custom stack size
                may not be getting the behavior they want
  * bmo#963033: AArch64 support update for NSPR
  * bmo#969061:	Incorrect end-of-list test when iterating over a
                PRCList in prcountr.c and prtrace.c
  * bmo#971152: IPv6 detection on linux depends on availability of
                /proc/net/if_inet6

- update to version 4.10.3
  * bmo#749849: ensure we'll free the thread-specific data key.
  * bmo#941461: don't compile android with unaligned memory access.
  * bmo#932398: Add PR_SyncMemMap, a portable version of
    msync/FlushViewOfFile.
  * bmo#952621: Fix a thread-unsafe access to lock-&amp;gt;owner in PR_Lock.
  * bmo#957458: Fix several bugs in the lock rank checking code.
  * bmo#936320: Use an alternative test for IPv6 support on Linux to
    avoid opening a socket.

Changes in mozilla-nss:
- update to 3.15.5
  * required for Firefox 28
  * export FREEBL_LOWHASH to get the correct default headers
    (bnc#865539)
  New functionality
  * Added support for the TLS application layer protocol negotiation
    (ALPN) extension. Two SSL socket options, SSL_ENABLE_NPN and
    SSL_ENABLE_ALPN, can be used to control whether NPN or ALPN (or both)
    should be used for application layer protocol negotiation.
  * Added the TLS padding extension. The extension type value is 35655,
    which may change when an official extension type value is assigned
    by IANA. NSS automatically adds the padding extension to ClientHello
    when necessary.
  * Added a new macro CERT_LIST_TAIL, defined in certt.h, for getting
    the tail of a CERTCertList.
  Notable Changes
  * bmo#950129: Improve the OCSP fetching policy when verifying OCSP
    responses
  * bmo#949060: Validate the iov input argument (an array of PRIOVec
    structures) of ssl_WriteV (called via PR_Writev). Applications should
    still take care when converting struct iov to PRIOVec because the
    iov_len members of the two structures have different types
    (size_t vs. int). size_t is unsigned and may be larger than int.
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094493" comment="MozillaFirefox-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094494" comment="MozillaFirefox-branding-upstream-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094495" comment="MozillaFirefox-buildsymbols-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094496" comment="MozillaFirefox-devel-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094497" comment="MozillaFirefox-translations-common-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094498" comment="MozillaFirefox-translations-other-28.0-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094499" comment="mozilla-nspr-32bit-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094500" comment="mozilla-nspr-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094501" comment="mozilla-nspr-devel-4.10.4-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094502" comment="libfreebl3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094503" comment="libfreebl3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094504" comment="libsoftokn3-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094505" comment="libsoftokn3-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094506" comment="mozilla-nss-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094507" comment="mozilla-nss-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094508" comment="mozilla-nss-certs-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094509" comment="mozilla-nss-certs-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094510" comment="mozilla-nss-devel-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094511" comment="mozilla-nss-sysinit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094512" comment="mozilla-nss-sysinit-32bit-3.15.5-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094513" comment="mozilla-nss-tools-3.15.5-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:284" version="1" class="patch">
	<metadata>
		<title>openssl: fix for ECDSA side channel attack</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

openssl was updated to fix a timing attack, where it was theoretically possible to recover ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094659" comment="libopenssl-devel-1.0.1e-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094660" comment="libopenssl-devel-32bit-1.0.1e-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094661" comment="libopenssl1_0_0-1.0.1e-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094662" comment="libopenssl1_0_0-32bit-1.0.1e-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094663" comment="openssl-1.0.1e-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094664" comment="openssl-doc-1.0.1e-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:285" version="1" class="patch">
	<metadata>
		<title>file: fixed potential CPU consumption problem</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

file was updated to fix extensive backtracking in awk rule regular
expression which could lead to a CPU consumption denial of service.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094665" comment="file-5.11-12.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094666" comment="file-devel-5.11-12.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094667" comment="libmagic-data-5.11-12.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094668" comment="libmagic1-32bit-5.11-12.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094669" comment="libmagic1-5.11-12.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094670" comment="python-magic-5.11-12.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:286" version="1" class="patch">
	<metadata>
		<title>chromium: security update to 33.0.1750.152 stable release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Chromium was updated to the 33.0.1750.152 stable channel uodate:
- Security fixes:
  * CVE-2014-1713: Use-after-free in Blink bindings
  * CVE-2014-1714: Windows clipboard vulnerability
  * CVE-2014-1705: Memory corruption in V8
  * CVE-2014-1715: Directory traversal issue

Previous stable channel update 33.0.1750.149:
- Security fixes:
  * CVE-2014-1700: Use-after-free in speech
  * CVE-2014-1701: UXSS in events
  * CVE-2014-1702: Use-after-free in web database
  * CVE-2014-1703: Potential sandbox escape due to a 
    use-after-free in web sockets
  * CVE-2014-1704: Multiple vulnerabilities in V8 fixed in 
    version 3.23.17.18
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094853" comment="chromedriver-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094854" comment="chromium-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094855" comment="chromium-desktop-gnome-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094856" comment="chromium-desktop-kde-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094857" comment="chromium-ffmpegsumo-33.0.1750.152-1.33.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094858" comment="chromium-suid-helper-33.0.1750.152-1.33.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:287" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird,seamonkey: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Mozilla Thunderbird was updated to 24.4.0.
Mozilla SeaMonkey was updated to 2.25.

  * MFSA 2014-15/CVE-2014-1493/CVE-2014-1494
    Miscellaneous memory safety hazards
  * MFSA 2014-17/CVE-2014-1497 (bmo#966311)
    Out of bounds read during WAV file decoding
  * MFSA 2014-18/CVE-2014-1498 (bmo#935618)
    crypto.generateCRMFRequest does not validate type of key
  * MFSA 2014-19/CVE-2014-1499 (bmo#961512)
    Spoofing attack on WebRTC permission prompt
  * MFSA 2014-20/CVE-2014-1500 (bmo#956524)
    onbeforeunload and Javascript navigation DOS
  * MFSA 2014-22/CVE-2014-1502 (bmo#972622)
    WebGL content injection from one domain to rendering in another
  * MFSA 2014-23/CVE-2014-1504 (bmo#911547)
    Content Security Policy for data: documents not preserved by
    session restore
  * MFSA 2014-26/CVE-2014-1508 (bmo#963198)
    Information disclosure through polygon rendering in MathML
  * MFSA 2014-27/CVE-2014-1509 (bmo#966021)
    Memory corruption in Cairo during PDF font rendering
  * MFSA 2014-28/CVE-2014-1505 (bmo#941887)
    SVG filters information disclosure through feDisplacementMap
  * MFSA 2014-29/CVE-2014-1510/CVE-2014-1511 (bmo#982906, bmo#982909)
    Privilege escalation using WebIDL-implemented APIs
  * MFSA 2014-30/CVE-2014-1512 (bmo#982957)
    Use-after-free in TypeObject
  * MFSA 2014-31/CVE-2014-1513 (bmo#982974)
    Out-of-bounds read/write through neutering ArrayBuffer objects
  * MFSA 2014-32/CVE-2014-1514 (bmo#983344)
    Out-of-bounds write through TypedArrayObject after neutering

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095307" comment="MozillaThunderbird-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095308" comment="MozillaThunderbird-buildsymbols-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095309" comment="MozillaThunderbird-devel-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095310" comment="MozillaThunderbird-translations-common-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095311" comment="MozillaThunderbird-translations-other-24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095312" comment="enigmail-1.6.0+24.4.0-61.43.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095313" comment="seamonkey-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095314" comment="seamonkey-dom-inspector-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095315" comment="seamonkey-irc-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095316" comment="seamonkey-translations-common-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095317" comment="seamonkey-translations-other-2.25-1.41.5 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095318" comment="seamonkey-venkman-2.25-1.41.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:288" version="1" class="patch">
	<metadata>
		<title>libyaml: fixed heap overflow</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
libyaml was updated to fix a heap overflow during parsing.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094859" comment="libyaml-0-2-0.1.3-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094860" comment="libyaml-0.1.3-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094861" comment="libyaml-devel-0.1.3-11.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:289" version="1" class="patch">
	<metadata>
		<title>nagios: fixed a buffer overflow</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Nagios was updated to fix a stack-based buffer overflow in the cmd_submitf function
in the CGI handler. (CVE-2014-1878)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094900" comment="nagios-3.5.0-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094901" comment="nagios-devel-3.5.0-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094902" comment="nagios-www-3.5.0-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094903" comment="nagios-www-dch-3.5.0-2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:290" version="1" class="patch">
	<metadata>
		<title>a2ps: fixed commandinjection in fixps</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
a2ps was updated to fix a security issue:

fixps called ghostscript without -dSAFER, enabling postscript files processed
by fixps to execute code on the system. (CVE-2014-0466)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094862" comment="a2ps-4.13-1353.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094863" comment="a2ps-devel-4.13-1353.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:291" version="1" class="patch">
	<metadata>
		<title>xinetd: security update for tcpmux service</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

xinetd was updated to receive security fixes and a bug fix.

Security issues fixed:
* CVE-2013-4342 (bnc#844230)
  - xinetd ignored user and group directives for tcpmux services
* CVE-2012-0862 (bnc#762294)
  - xinetd enabled all services when tcp multiplexing is used

Also added support for setting maximum number of open files (bnc#855685).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094904" comment="xinetd-2.3.14-163.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:292" version="1" class="patch">
	<metadata>
		<title>update for jakarta-commons-fileupload</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This jakarta-commons-fileupload update fixes the follwoing security and
non security issues:

- bnc#862781: Fixed buffer overflow and resulting DoS (CVE-2014-0050).
- Removed gcj part and deprecated macros.
- Moved from jpackage-utils to javapackage-tools.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095130" comment="jakarta-commons-fileupload-1.1.1-114.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095131" comment="jakarta-commons-fileupload-javadoc-1.1.1-114.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:293" version="1" class="patch">
	<metadata>
		<title>update for rubygem-rack-ssl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This rubygem-rack-ssl updated fixes the following security issue:

- bnc#869162: Fixed XSS in error page (CVE-2014-2538).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094905" comment="rubygem-rack-ssl-1.3.2-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094906" comment="rubygem-rack-ssl-doc-1.3.2-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:294" version="1" class="patch">
	<metadata>
		<title>update for python</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This python updated fixes the following security issue:

- bnc#863741: Fixed potential buffer overflow in socket.recvfrom_into 
  (CVE-2014-1912).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094907" comment="libpython2_7-1_0-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094908" comment="libpython2_7-1_0-32bit-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094909" comment="python-base-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094910" comment="python-base-32bit-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094911" comment="python-devel-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094912" comment="python-xml-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094913" comment="python-doc-2.7-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094914" comment="python-doc-pdf-2.7-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094915" comment="python-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094916" comment="python-32bit-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094917" comment="python-curses-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094918" comment="python-demo-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094919" comment="python-gdbm-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094920" comment="python-idle-2.7.3-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094921" comment="python-tk-2.7.3-10.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:295" version="1" class="patch">
	<metadata>
		<title>update for otrs</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This otrs update fixes the following security and non security issues:

- bnc#871758: Fixed OSA-2014-04 (CVE-2014-2553) and OSA-2014-05 
  (CVE-2014-2554).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095132" comment="otrs-3.1.21-26.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095133" comment="otrs-doc-3.1.21-26.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095134" comment="otrs-itsm-3.1.10-26.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:296" version="1" class="patch">
	<metadata>
		<title>update for openssl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This openssl update fixes one security issue:

- bnc#872299: Fixed missing bounds checks for heartbeat messages 
  (CVE-2014-0160).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009094698" comment="libopenssl-devel-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094699" comment="libopenssl-devel-32bit-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094700" comment="libopenssl1_0_0-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094701" comment="libopenssl1_0_0-32bit-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094702" comment="openssl-1.0.1e-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009094703" comment="openssl-doc-1.0.1e-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:297" version="1" class="patch">
	<metadata>
		<title>update for couchdb</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This couchdb update fixes one security issue:

- bnc#871111: Fixed remote denial of service via /_uuids that allowed
  remote attackers to cause CPU and memory consumption.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095135" comment="couchdb-1.2.0-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:298" version="1" class="patch">
	<metadata>
		<title>CVE-2014-0128: squid can crash when SSLBump is used in combination with range requests.</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
The SSLBump feature acts as TLS/SSL termination for clients. If this feature is enabled, squid can crash with range requests, leading to a potential Denial of Service condition.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095136" comment="squid-3.2.11-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:299" version="1" class="patch">
	<metadata>
		<title>update for curl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This curl update fixes two security issues:

- bnc#868627: Fixed wrong re-use of connections (CVE-2014-0138).
- bnc#868629: Fixed IP address wildcard certificate validation 
  (CVE-2014-0139).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095331" comment="curl-7.28.1-4.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095332" comment="libcurl-devel-7.28.1-4.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095333" comment="libcurl4-32bit-7.28.1-4.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095334" comment="libcurl4-7.28.1-4.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:300" version="1" class="patch">
	<metadata>
		<title>update for json-c</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This json-c update fixes the following two security issue:

- bnc#870147: Fixed buffer overflow if size_t is larger than int 
  (CVE-2013-6370).
- bnc#870147: Fixed possible hash collision DoS (CVE-2013-6371).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095137" comment="json-c-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095138" comment="libjson-devel-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095139" comment="libjson-doc-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095140" comment="libjson0-0.9-13.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095141" comment="libjson0-32bit-0.9-13.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:301" version="1" class="patch">
	<metadata>
		<title>update for python3</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This python update fixes the following security and non-security issues:

- bnc#869222: Fixed DoS when opening malicious archives (CVE-2013-7338).
- bnc#863741: Fixed buffer overflow in socket.recvfrom_into
  (CVE-2014-1912).
- bnc#871152: Fixed race condition with umask when creating directories 
  with os.mkdirs (CVE-2014-2667).
- bnc#637176: Fixed update multilib patch to handle home install scheme.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095335" comment="libpython3_3m1_0-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095336" comment="libpython3_3m1_0-32bit-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095337" comment="python3-base-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095338" comment="python3-base-32bit-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095339" comment="python3-devel-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095340" comment="python3-idle-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095341" comment="python3-testsuite-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095342" comment="python3-tools-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095343" comment="python3-doc-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095344" comment="python3-doc-pdf-3.3.0-6.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095345" comment="python3-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095346" comment="python3-32bit-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095347" comment="python3-curses-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095348" comment="python3-dbm-3.3.0-6.15.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095349" comment="python3-tk-3.3.0-6.15.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:302" version="1" class="patch">
	<metadata>
		<title>update for openssl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This is an openssl version update to 1.0.1g.

- The main reason for this upgrade was to be clear about the TLS 
  heartbeat problem know as &amp;quot;Heartbleed&amp;quot; (CVE-2014-0160). That 
  problem was already fixed in our previous openssl update. 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095142" comment="libopenssl-devel-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095143" comment="libopenssl-devel-32bit-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095144" comment="libopenssl1_0_0-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095145" comment="libopenssl1_0_0-32bit-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095146" comment="openssl-1.0.1g-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095147" comment="openssl-doc-1.0.1g-1.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:303" version="1" class="patch">
	<metadata>
		<title>update for chromium</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This chromium version update fixes the following security and 
non-security issues:

- Add patch chromium-fix-arm-skia-memset.patch to resolve a linking
  issue on ARM with regards to missing symbols.
- Add patch arm_use_gold.patch to use the right gold binaries on 
  ARM. Hopefully this resolves the build issues with running out of 
  memory
- bnc#872805: Update to Chromium 34.0.1847.116
  * Responsive Images and Unprefixed Web Audio
  * Import supervised users onto new computers
  * A number of new apps/extension APIs 
  * Lots of under the hood changes for stability and performance 
  - Security fixes:
    * CVE-2014-1716: UXSS in V8
    * CVE-2014-1717: OOB access in V8
    * CVE-2014-1718: Integer overflow in compositor
    * CVE-2014-1719: Use-after-free in web workers
    * CVE-2014-1720: Use-after-free in DOM
    * CVE-2014-1721: Memory corruption in V8
    * CVE-2014-1722: Use-after-free in rendering
    * CVE-2014-1723: Url confusion with RTL characters
    * CVE-2014-1724: Use-after-free in speech
    * CVE-2014-1725: OOB read with window property
    * CVE-2014-1726: Local cross-origin bypass
    * CVE-2014-1727: Use-after-free in forms
    * CVE-2014-1728: Various fixes from internal audits, 
                     fuzzing and other initiatives
    * CVE-2014-1729: Multiple vulnerabilities in V8 
- No longer build against system libraries as that Chromium works
  a lot better and crashes less on websites than with system libs
- Added package depot_tools.tar.gz as that the chromium build now 
  requires it during the initial build phase. It just contains some
  utilities and nothing from it is being installed.
- If people want to install newer versions of the ffmpeg library
  then let them. This is what they want.
- Remove the buildscript from the sources
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095350" comment="chromedriver-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095351" comment="chromium-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095352" comment="chromium-desktop-gnome-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095353" comment="chromium-desktop-kde-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095354" comment="chromium-ffmpegsumo-34.0.1847.116-1.37.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095355" comment="chromium-suid-helper-34.0.1847.116-1.37.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:304" version="1" class="patch">
	<metadata>
		<title>cacti: security fixes; cacti-spine: update to 0.8.8b</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
cacti was patched to fix several security issues:

  * CVE-2013-5588: XSS injection vulnerability
  * CVE-2013-5589: SQL injection vulnerability
  * CVE-2014-2326: XSS injection vulnerability
  * CVE-2014-2328: Remote Command Execution Vulnerability
  * CVE-2014-2708: SQL Injection Vulnerability
  * CVE-2014-2709: Remote Command Execution Vulnerability


cacti-spine was updated to 0.8.8b to fix the following issue:

 * bug: set appropriate mysql 5.5+ timeouts		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095356" comment="cacti-spine-0.8.8b-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095357" comment="cacti-0.8.8b-5.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:305" version="1" class="patch">
	<metadata>
		<title>OpenSSL: Fixed a use-after-free race condition in OpenSSL's read buffer.
</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
A use-after-free race condition in OpenSSL's read buffer was fixed that could cause connections to drop (CVE-2010-5298).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095358" comment="libopenssl-devel-1.0.1g-1.52.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095359" comment="libopenssl-devel-32bit-1.0.1g-1.52.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095360" comment="libopenssl1_0_0-1.0.1g-1.52.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095361" comment="libopenssl1_0_0-32bit-1.0.1g-1.52.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095362" comment="openssl-1.0.1g-1.52.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095363" comment="openssl-doc-1.0.1g-1.52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:306" version="1" class="patch">
	<metadata>
		<title>python-imaging: Fix for temporary file race condition</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
A temporary file race condition has been fixed in python-imaging when converting images (CVE-2014-1932, CVE-2014-1933).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095364" comment="python-imaging-1.1.7-15.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095365" comment="python-imaging-sane-1.1.7-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:307" version="1" class="patch">
	<metadata>
		<title>update for libmms</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This libmss update fixes the following security issue.

- bnc#874723: Fixed a possible heap memory overrun (CVE-2014-2892).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095366" comment="libmms-0.6.2-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095367" comment="libmms-devel-0.6.2-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095368" comment="libmms0-0.6.2-10.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095369" comment="libmms0-32bit-0.6.2-10.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:308" version="1" class="patch">
	<metadata>
		<title>update for nrpe</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This nrpe update fixes the following security documentation problem.

- bnc#874743: Documented a possible command injection when command 
  arguments are enabled (CVE-2014-2913). More details can be found 
  inside the documentation of this package.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095370" comment="nagios-plugins-nrpe-2.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095371" comment="nrpe-2.14-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095372" comment="nrpe-doc-2.14-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:309" version="1" class="patch">
	<metadata>
		<title>update for libpng15</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This libpng update fixes the following security issue:

- bnc#873124: Fixed integer overflow leading to a heap-based buffer 
  overflow in png_set_unknown_chunks() (CVE-2013-7353).
- bnc#873123: integer overflow leading to a heap-based buffer
  overflow in png_set_sPLT() and png_set_text_2() (CVE-2013-7354)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095493" comment="libpng15-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095494" comment="libpng15-15-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095495" comment="libpng15-15-32bit-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095496" comment="libpng15-compat-devel-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095497" comment="libpng15-compat-devel-32bit-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095498" comment="libpng15-devel-1.5.13-3.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095499" comment="libpng15-devel-32bit-1.5.13-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:310" version="1" class="patch">
	<metadata>
		<title>update for libpng12</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This libpng12 update fixes the following two security issues.

- bnc#873123: Fixed integer overflow leading to a heap-based buffer 
  overflow in png_set_sPLT() and png_set_text_2() (CVE-2013-7354).
- bnc#873124: Fixed integer overflow leading to a heap-based buffer 
  overflow in png_set_unknown_chunks() (CVE-2013-7353). 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095500" comment="libpng12-0-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095501" comment="libpng12-0-32bit-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095502" comment="libpng12-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095503" comment="libpng12-compat-devel-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095504" comment="libpng12-compat-devel-32bit-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095505" comment="libpng12-devel-1.2.50-3.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095506" comment="libpng12-devel-32bit-1.2.50-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:311" version="1" class="patch">
	<metadata>
		<title>update for MozillaFirefox</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This is a MozillaFirefox update to version 29.0:
  * MFSA 2014-34/CVE-2014-1518/CVE-2014-1519
    Miscellaneous memory safety hazards
  * MFSA 2014-36/CVE-2014-1522 (bmo#995289)
    Web Audio memory corruption issues
  * MFSA 2014-37/CVE-2014-1523 (bmo#969226)
    Out of bounds read while decoding JPG images
  * MFSA 2014-38/CVE-2014-1524 (bmo#989183)
    Buffer overflow when using non-XBL object as XBL
  * MFSA 2014-39/CVE-2014-1525 (bmo#989210)
    Use-after-free in the Text Track Manager for HTML video
  * MFSA 2014-41/CVE-2014-1528 (bmo#963962)
    Out-of-bounds write in Cairo
  * MFSA 2014-42/CVE-2014-1529 (bmo#987003)
    Privilege escalation through Web Notification API
  * MFSA 2014-43/CVE-2014-1530 (bmo#895557)
    Cross-site scripting (XSS) using history navigations
  * MFSA 2014-44/CVE-2014-1531 (bmo#987140)
    Use-after-free in imgLoader while resizing images
  * MFSA 2014-45/CVE-2014-1492 (bmo#903885)
    Incorrect IDNA domain name matching for wildcard certificates
    (fixed by NSS 3.16)
  * MFSA 2014-46/CVE-2014-1532 (bmo#966006)
    Use-after-free in nsHostResolver
  * MFSA 2014-47/CVE-2014-1526 (bmo#988106)
    Debugger can bypass XrayWrappers with JavaScript
- rebased patches
- removed obsolete patches
  * firefox-browser-css.patch
  * mozilla-aarch64-599882cfb998.diff
  * mozilla-aarch64-bmo-963028.patch
  * mozilla-aarch64-bmo-963029.patch
  * mozilla-aarch64-bmo-963030.patch
  * mozilla-aarch64-bmo-963031.patch
- requires NSS 3.16
- added mozilla-icu-strncat.patch to fix post build checks

- add mozilla-aarch64-599882cfb998.patch,
      mozilla-aarch64-bmo-810631.patch,
      mozilla-aarch64-bmo-962488.patch,
      mozilla-aarch64-bmo-963030.patch,
      mozilla-aarch64-bmo-963027.patch,
      mozilla-aarch64-bmo-963028.patch,
      mozilla-aarch64-bmo-963029.patch,
      mozilla-aarch64-bmo-963023.patch,
      mozilla-aarch64-bmo-963024.patch,
      mozilla-aarch64-bmo-963031.patch: AArch64 porting

- Add patch for bmo#973977
  * mozilla-ppc64-xpcom.patch

- Refresh mozilla-ppc64le-xpcom.patch patch

- Adapt mozilla-ppc64le-xpcom.patch to Mozilla &amp;gt; 24.0 build system

This is also a mozilla-nss update to version 3.16:
  * required for Firefox 29
  * bmo#903885 - (CVE-2014-1492) In a wildcard certificate, the wildcard
    character should not be embedded within the U-label of an
    internationalized domain name. See the last bullet point in RFC 6125,
    Section 7.2.
  * Supports the Linux x32 ABI. To build for the Linux x32 target, set
    the environment variable USE_X32=1 when building NSS.
  New Functions:
  * NSS_CMSSignerInfo_Verify
  New Macros
  * TLS_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_3DES_EDE_CBC_SHA, etc.,
    cipher suites that were first defined in SSL 3.0 can now be referred
    to with their official IANA names in TLS, with the TLS_ prefix.
    Previously, they had to be referred to with their names in SSL 3.0,
    with the SSL_ prefix.
  Notable Changes:
  * ECC is enabled by default. It is no longer necessary to set the
    environment variable NSS_ENABLE_ECC=1 when building NSS. To disable
    ECC, set the environment variable NSS_DISABLE_ECC=1 when building NSS.
  * libpkix should not include the common name of CA as DNS names when
    evaluating name constraints.
  * AESKeyWrap_Decrypt should not return SECSuccess for invalid keys.
  * Fix a memory corruption in sec_pkcs12_new_asafe.
  * If the NSS_SDB_USE_CACHE environment variable is set, skip the runtime
    test sdb_measureAccess.
  * The built-in roots module has been updated to version 1.97, which
    adds, removes, and distrusts several certificates.
  * The atob utility has been improved to automatically ignore lines of
    text that aren't in base64 format.
  * The certutil utility has been improved to support creation of
    version 1 and version 2 certificates, in addition to the existing
    version 3 support.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095373" comment="MozillaFirefox-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095374" comment="MozillaFirefox-branding-upstream-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095375" comment="MozillaFirefox-buildsymbols-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095376" comment="MozillaFirefox-devel-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095377" comment="MozillaFirefox-translations-common-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095378" comment="MozillaFirefox-translations-other-29.0-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095379" comment="libfreebl3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095380" comment="libfreebl3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095381" comment="libsoftokn3-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095382" comment="libsoftokn3-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095383" comment="mozilla-nss-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095384" comment="mozilla-nss-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095385" comment="mozilla-nss-certs-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095386" comment="mozilla-nss-certs-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095387" comment="mozilla-nss-devel-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095388" comment="mozilla-nss-sysinit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095389" comment="mozilla-nss-sysinit-32bit-3.16-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095390" comment="mozilla-nss-tools-3.16-1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:312" version="1" class="patch">
	<metadata>
		<title>update for MozillaThunderbird</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This is a MozillaThunderbird update to version 24.5.0:
  * MFSA 2014-34/CVE-2014-1518
    Miscellaneous memory safety hazards
  * MFSA 2014-37/CVE-2014-1523 (bmo#969226)
    Out of bounds read while decoding JPG images
  * MFSA 2014-38/CVE-2014-1524 (bmo#989183)
    Buffer overflow when using non-XBL object as XBL
  * MFSA 2014-42/CVE-2014-1529 (bmo#987003)
    Privilege escalation through Web Notification API
  * MFSA 2014-43/CVE-2014-1530 (bmo#895557)
    Cross-site scripting (XSS) using history navigations
  * MFSA 2014-44/CVE-2014-1531 (bmo#987140)
    Use-after-free in imgLoader while resizing images
  * MFSA 2014-46/CVE-2014-1532 (bmo#966006)
    Use-after-free in nsHostResolver
- use shipped-locales as the authoritative source for supported
  locales (some unsupported locales disappear from -other package)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095630" comment="MozillaThunderbird-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095631" comment="MozillaThunderbird-buildsymbols-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095632" comment="MozillaThunderbird-devel-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095633" comment="MozillaThunderbird-translations-common-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095634" comment="MozillaThunderbird-translations-other-24.5.0-61.47.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095635" comment="enigmail-1.6.0+24.5.0-61.47.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:313" version="1" class="patch">
	<metadata>
		<title>update for seamonkey</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This is a SeaMonkey update to version 2.26:
  * MFSA 2014-34/CVE-2014-1518/CVE-2014-1519
    Miscellaneous memory safety hazards
  * MFSA 2014-36/CVE-2014-1522 (bmo#995289)
    Web Audio memory corruption issues
  * MFSA 2014-37/CVE-2014-1523 (bmo#969226)
    Out of bounds read while decoding JPG images
  * MFSA 2014-38/CVE-2014-1524 (bmo#989183)
    Buffer overflow when using non-XBL object as XBL
  * MFSA 2014-39/CVE-2014-1525 (bmo#989210)
    Use-after-free in the Text Track Manager for HTML video
  * MFSA 2014-41/CVE-2014-1528 (bmo#963962)
    Out-of-bounds write in Cairo
  * MFSA 2014-42/CVE-2014-1529 (bmo#987003)
    Privilege escalation through Web Notification API
  * MFSA 2014-43/CVE-2014-1530 (bmo#895557)
    Cross-site scripting (XSS) using history navigations
  * MFSA 2014-44/CVE-2014-1531 (bmo#987140)
    Use-after-free in imgLoader while resizing images
  * MFSA 2014-45/CVE-2014-1492 (bmo#903885)
    Incorrect IDNA domain name matching for wildcard certificates
    (fixed by NSS 3.16)
  * MFSA 2014-46/CVE-2014-1532 (bmo#966006)
    Use-after-free in nsHostResolver
  * MFSA 2014-47/CVE-2014-1526 (bmo#988106)
    Debugger can bypass XrayWrappers with JavaScript
- rebased patches
- added aarch64 porting patches
  * mozilla-aarch64-bmo-810631.patch
  * mozilla-aarch64-bmo-962488.patch
  * mozilla-aarch64-bmo-963023.patch
  * mozilla-aarch64-bmo-963024.patch
  * mozilla-aarch64-bmo-963027.patch
- requires NSPR 4.10.3 and NSS 3.16
- added mozilla-icu-strncat.patch to fix post build checks
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095519" comment="seamonkey-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095520" comment="seamonkey-dom-inspector-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095521" comment="seamonkey-irc-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095522" comment="seamonkey-translations-common-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095523" comment="seamonkey-translations-other-2.26-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095524" comment="seamonkey-venkman-2.26-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:314" version="1" class="patch">
	<metadata>
		<title>update for python-eyeD3</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This python-eyeD3 update fixes the following security issue:

- bnc#863744: Fixed insecure use of temporary files (CVE-2014-1934).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095507" comment="python-eyeD3-0.6.18-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:315" version="1" class="patch">
	<metadata>
		<title>update for android-tools</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Fix overflow in adb CVE-2014-1909 [bnc#863074]
  * fix-overflow-in-adb_client.patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095553" comment="android-tools-4.2.1_r1-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:316" version="1" class="patch">
	<metadata>
		<title>update for openssl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Fixed bug[ bnc#876282], CVE-2014-0198 openssl: OpenSSL NULL pointer dereference in do_ssl3_write
  Add file: CVE-2014-0198.patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095554" comment="libopenssl-devel-1.0.1g-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095555" comment="libopenssl-devel-32bit-1.0.1g-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095556" comment="libopenssl1_0_0-1.0.1g-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095557" comment="libopenssl1_0_0-32bit-1.0.1g-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095558" comment="openssl-1.0.1g-1.56.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095559" comment="openssl-doc-1.0.1g-1.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:317" version="1" class="patch">
	<metadata>
		<title>update for chromium</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Update to Chromium 34.0.1847.132
  * Security update:
    - CVE-2014-1730: Type confusion in V8
    - CVE-2014-1731: Type confusion in DOM
    - CVE-2014-1732: Use-after-free in Speech Recognition
    - CVE-2014-1733: Compiler bug in Seccomp-BPF
    - CVE-2014-1734: Various fixes from internal audits, fuzzing 
                     and other initiatives
    - CVE-2014-1735: Multiple vulnerabilities in V8 fixed in 
                     version 3.24.35.33

- Update to Chromium 34.0.1847.131
  * Bugfixes
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095743" comment="chromedriver-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095744" comment="chromium-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095745" comment="chromium-desktop-gnome-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095746" comment="chromium-desktop-kde-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095747" comment="chromium-ffmpegsumo-34.0.1847.132-1.41.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095748" comment="chromium-suid-helper-34.0.1847.132-1.41.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:318" version="1" class="patch">
	<metadata>
		<title>libxml2 security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

  - fix for CVE-2014-0191 (bnc#876652)
  * libxml2: external parameter entity loaded when entity
    substitution is disabled
  * added libxml2-CVE-2014-0191.patch
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095652" comment="libxml2-2-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095653" comment="libxml2-2-32bit-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095654" comment="libxml2-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095655" comment="libxml2-devel-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095656" comment="libxml2-devel-32bit-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095657" comment="libxml2-doc-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095658" comment="libxml2-tools-2.9.0-2.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095659" comment="python-libxml2-2.9.0-2.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:319" version="1" class="patch">
	<metadata>
		<title>libvirt: Fixed unsafe parsing of XML documents</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
libvirt was patched to prevent expansion of entities when parsing XML files. This vulnerability allowed malicious users to read arbitrary files or
cause a denial of service (CVE-2014-0179).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095660" comment="libvirt-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095661" comment="libvirt-client-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095662" comment="libvirt-client-32bit-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095663" comment="libvirt-devel-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095664" comment="libvirt-devel-32bit-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095665" comment="libvirt-doc-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095666" comment="libvirt-lock-sanlock-1.0.2-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095667" comment="libvirt-python-1.0.2-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:320" version="1" class="patch">
	<metadata>
		<title>kernel: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The Linux Kernel was updated to fix various security issues and bugs.

Main security issues fixed:

A security issue in the tty layer that was fixed that could be used
by local attackers for code execution (CVE-2014-0196).

Two security issues in the floppy driver were fixed that could be
used by local attackers on machines with the floppy to crash the kernel
or potentially execute code in the kernel (CVE-2014-1737 CVE-2014-1738).

Other security issues and bugs that were fixed:
- netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper
  (bnc#860835 CVE-2014-1690).

- net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH
  (bnc#866102, CVE-2014-0101).

- n_tty: Fix a n_tty_write crash and code execution when echoing in raw
  mode (bnc#871252 bnc#875690 CVE-2014-0196).

- netfilter: nf_ct_sip: support Cisco 7941/7945 IP phones (bnc#873717).

- Update config files: re-enable twofish crypto support
  Software twofish crypto support was disabled in several architectures
  since openSUSE 10.3. For i386 and x86_64 it was on purpose, because
  hardware-accelerated alternatives exist. However for all other
  architectures it was by accident.
  Re-enable software twofish crypto support in arm, ia64 and ppc
  configuration files, to guarantee that at least one implementation is
  always available (bnc#871325).

- Update config files: disable CONFIG_TOUCHSCREEN_W90X900
  The w90p910_ts driver only makes sense on the W90x900 architecture,
  which we do not support.

- ath9k: protect tid-&amp;gt;sched check (bnc#871148,CVE-2014-2672).

- Fix dst_neigh_lookup/dst_neigh_lookup_skb return value handling
  bug (bnc#869898).

- SELinux:  Fix kernel BUG on empty security contexts
  (bnc#863335,CVE-2014-1874).

- hamradio/yam: fix info leak in ioctl (bnc#858872, CVE-2014-1446).

- wanxl: fix info leak in ioctl (bnc#858870, CVE-2014-1445).

- farsync: fix info leak in ioctl (bnc#858869, CVE-2014-1444).

- ARM: 7809/1: perf: fix event validation for software group
  leaders (CVE-2013-4254, bnc#837111).

- netfilter: nf_conntrack_dccp: fix skb_header_pointer API usages
  (bnc#868653, CVE-2014-2523).

- ath9k_htc: properly set MAC address and BSSID mask
  (bnc#851426, CVE-2013-4579).

- drm/ttm: don't oops if no invalidate_caches() (bnc#869414).

- Apply missing patches.fixes/drm-nouveau-hwmon-rename-fan0-to-fan1.patch

- xfs: growfs: use uncached buffers for new headers (bnc#858233).

- xfs: use btree block initialisation functions in growfs
  (bnc#858233).

- Revert &amp;quot;Delete patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end.&amp;quot; (bnc#858233)
  Put back again the patch
  patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end back
  as there is a better fix than reverting the affecting patch.

- Delete patches.fixes/xfs-fix-xfs_buf_find-oops-on-blocks-beyond-the-filesystem-end.
  It turned out that this patch causes regressions (bnc#858233)
  The upstream 3.7.x also reverted it in the end (commit c3793e0d94af2).

- tcp: syncookies: reduce cookie lifetime to 128 seconds
  (bnc#833968).
- tcp: syncookies: reduce mss table to four values (bnc#833968).

- x86, cpu, amd: Add workaround for family 16h, erratum 793
  (bnc#852967 CVE-2013-6885).

- cifs: ensure that uncached writes handle unmapped areas
  correctly (bnc#864025 CVE-2014-0691).

- x86, fpu, amd: Clear exceptions in AMD FXSAVE workaround (bnc#858638 CVE-2014-1438).

- xencons: generalize use of add_preferred_console() (bnc#733022,
  bnc#852652).
- balloon: don't crash in HVM-with-PoD guests.
- hwmon: (coretemp) Fix truncated name of alarm attributes.

- NFS: Avoid PUTROOTFH when managing leases (bnc#811746).

- cifs: delay super block destruction until all cifsFileInfo
  objects are gone (bnc#862145).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009095780" comment="kernel-debug-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095781" comment="kernel-debug-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095782" comment="kernel-debug-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095783" comment="kernel-default-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095784" comment="kernel-default-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095785" comment="kernel-default-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095786" comment="kernel-desktop-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095787" comment="kernel-desktop-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095788" comment="kernel-desktop-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095789" comment="kernel-docs-3.7.10-1.32.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095790" comment="kernel-ec2-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095791" comment="kernel-ec2-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095792" comment="kernel-ec2-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095793" comment="kernel-pae-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095794" comment="kernel-pae-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095795" comment="kernel-pae-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095796" comment="kernel-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095797" comment="kernel-source-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095798" comment="kernel-source-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095799" comment="kernel-syms-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095800" comment="kernel-trace-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095801" comment="kernel-trace-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095802" comment="kernel-trace-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095803" comment="kernel-vanilla-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095804" comment="kernel-vanilla-devel-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095805" comment="kernel-xen-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095806" comment="kernel-xen-base-3.7.10-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009095807" comment="kernel-xen-devel-3.7.10-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:321" version="1" class="patch">
	<metadata>
		<title>strongswan: Fix for authentication bypass and DoS vulnerability</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
strongswan was fixed to correct two issues:
- Fix for DoS vulnerability by a NULL-pointer dereference (CVE-2014-2891).
- Fix for a authentication bypass vulnerability in the IKEv2 code (CVE-2014-2338).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096013" comment="strongswan-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096014" comment="strongswan-doc-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096015" comment="strongswan-ipsec-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096016" comment="strongswan-libs0-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096017" comment="strongswan-mysql-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096018" comment="strongswan-nm-5.0.1-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096019" comment="strongswan-sqlite-5.0.1-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:322" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https: Fixed possible MITM</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
perl-LWP-Protocol-https was updated to prevent a possible MITM 
if the environment variables HTTPS_CA_DIR or HTTPS_CA_FILE were set (CVE-2014-3230).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096196" comment="perl-LWP-Protocol-https-6.03-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:323" version="1" class="patch">
	<metadata>
		<title>mumble: Fixed remote DoS vulnerabilities</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
mumble was updated to fix two security issues.
- The Mumble client did not properly HTML-escape some external strings before
using them in a rich-text (HTML) context (CVE-2014-3756).
- SVG images with local file references could trigger client DoS (CVE-2014-3755).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096077" comment="mumble-1.2.6-21.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096078" comment="mumble-32bit-1.2.6-21.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096079" comment="mumble-server-1.2.6-21.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:324" version="1" class="patch">
	<metadata>
		<title>libXfont: Fixed multiple vulnerabilities</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
libxfont was updated to fix multiple vulnerabilities:
- Integer overflow of allocations in font metadata file parsing (CVE-2014-0209).
- Unvalidated length fields when parsing xfs protocol replies (CVE-2014-0210).
- Integer overflows calculating memory needs for xfs replies (CVE-2014-0211).

These vulnerabilities could be used by a local, authenticated user to raise privileges
or by a remote attacker with control of the font server to execute code with the
privileges of the X server.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096080" comment="libXfont-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096081" comment="libXfont-devel-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096082" comment="libXfont-devel-32bit-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096083" comment="libXfont1-1.4.5-4.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096084" comment="libXfont1-32bit-1.4.5-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:325" version="1" class="patch">
	<metadata>
		<title>PostfixAdmin: update to 2.3.7</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Update PostfixAdmin to 2.3.7:
- fix a SQL injection in list-virtual.php (CVE-2014-2655, bnc#870434)
- add support for new longer TLDs like .international
- fix various small bugs
- translation updates for lt and da
- vacation.pl: disable use of TLS by default due to a bug in Mail::Sender 0.8.22 (you can re-enable it with $smtp_tls_allowed)		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096094" comment="postfixadmin-2.3.7-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:326" version="1" class="patch">
	<metadata>
		<title>update for rubygem-actionpack-3_2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- fix CVE-2014-0130: rubygem-actionpack: directory traversal issue
  (bnc#876714)
  CVE-2014-0130.patch: contains the fix
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096129" comment="rubygem-actionpack-3_2-3.2.12-1.28.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096130" comment="rubygem-actionpack-3_2-doc-3.2.12-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:327" version="1" class="patch">
	<metadata>
		<title>update for tor</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- tor 0.2.4.22 [bnc#878486]
  Tor was updated to the recommended version of the 0.2.4.x series.
- major features in 0.2.4.x:
  - improved client resilience
  - support better link encryption with forward secrecy
  - new NTor circuit handshake
  - change relay queue for circuit create requests from size-based
    limit to time-based limit
  - many bug fixes and minor features
- changes contained in 0.2.4.22: 
  Backports numerous high-priority fixes. These include blocking
  all authority signing keys that may have been affected by the
  OpenSSL &amp;quot;heartbleed&amp;quot; bug, choosing a far more secure set of TLS
  ciphersuites by default, closing a couple of memory leaks that
  could be used to run a target relay out of RAM.
  - Major features (security)
    - Block authority signing keys that were used on authorities
      vulnerable to the &amp;quot;heartbleed&amp;quot; bug in OpenSSL (CVE-2014-0160).
  - Major bugfixes (security, OOM):
    - Fix a memory leak that could occur if a microdescriptor parse
      fails during the tokenizing step.
  - Major bugfixes (TLS cipher selection):
    - The relay ciphersuite list is now generated automatically based
      on uniform criteria, and includes all OpenSSL ciphersuites with
      acceptable strength and forward secrecy.
    - Relays now trust themselves to have a better view than clients
      of which TLS ciphersuites are better than others.
    - Clients now try to advertise the same list of ciphersuites as
      Firefox 28.
- includes changes from 0.2.4.21:
    Further improves security against potential adversaries who find
    breaking 1024-bit crypto doable, and backports several stability
    and robustness patches from the 0.2.5 branch.
  - Major features (client security):
    - When we choose a path for a 3-hop circuit, make sure it contains
      at least one relay that supports the NTor circuit extension
      handshake. Otherwise, there is a chance that we're building
      a circuit that's worth attacking by an adversary who finds
      breaking 1024-bit crypto doable, and that chance changes the game
      theory.
  - Major bugfixes:
    - Do not treat streams that fail with reason
      END_STREAM_REASON_INTERNAL as indicating a definite circuit failure,
      since it could also indicate an ENETUNREACH connection error
- includes changes from 0.2.4.20:
  - Do not allow OpenSSL engines to replace the PRNG, even when
    HardwareAccel is set.
  - Fix assertion failure when AutomapHostsOnResolve yields an IPv6
    address.
  - Avoid launching spurious extra circuits when a stream is pending.
- packaging changes:
  - remove init script shadowing systemd unit
  - general cleanup
  - Add tor-fw-helper for UPnP port forwarding; not used by default
  - fix logrotate on systemd-only setups without init scripts,
    work tor-0.2.2.37-logrotate.patch to tor-0.2.4.x-logrotate.patch
  - verify source tarball signature
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096131" comment="tor-0.2.4.22-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:328" version="1" class="patch">
	<metadata>
		<title>policycoreutils setuid() fix</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>


Besides other enhancements, this version update contains:

- fix for CVE-2014-3215 (bnc#876832)
  * use PR_SET_NO_NEW_PRIVS to prevent gain of new privileges
  * added libcap-ng-CVE-2014-3215.patch

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096141" comment="libcap-ng-python-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096142" comment="python-capng-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096143" comment="libcap-ng-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096144" comment="libcap-ng-devel-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096145" comment="libcap-ng-utils-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096146" comment="libcap-ng0-0.6.6-11.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096147" comment="libcap-ng0-32bit-0.6.6-11.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:329" version="1" class="patch">
	<metadata>
		<title>update for libgadu</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Update to version 1.11.4, bugfix release:
  + Fix buffer overflow with remote code execution potential.
    Only triggerable by a Gadu-Gadu server or a man-in-the-middle.
    CVE-2013-6487 (bnc#861019, bnc#878540)
  + Fix memory overwrite in file transfer with proxy server.
    CVE-2014-3775 (bnc#878540)
  + Minor fixes reported by Pidgin project members.

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096132" comment="libgadu-1.11.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096133" comment="libgadu-devel-1.11.4-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096134" comment="libgadu3-1.11.4-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:330" version="1" class="patch">
	<metadata>
		<title>python-lxml: Fixed input sanitization</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
python-lxml was fixed to ensure proper input sanitization in clean_html (CVE-2014-3146).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096148" comment="python-lxml-2.3.4-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096149" comment="python-lxml-doc-2.3.4-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096150" comment="python3-lxml-2.3.4-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096151" comment="python3-lxml-doc-2.3.4-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:331" version="1" class="patch">
	<metadata>
		<title>libxml2, python-libxml2: Prevent external entities from being loaded</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Updated fix for openSUSE-SU-2014:0645-1 because of a regression that
caused xmllint to break.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096095" comment="libxml2-2-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096096" comment="libxml2-2-32bit-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096097" comment="libxml2-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096098" comment="libxml2-devel-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096099" comment="libxml2-devel-32bit-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096100" comment="libxml2-doc-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096101" comment="libxml2-tools-2.9.0-2.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096102" comment="python-libxml2-2.9.0-2.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:332" version="1" class="patch">
	<metadata>
		<title>chromium: Various security fixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
chromium was updated to version 35.0.1916.114 to fix various security issues.
Security fixes:
* CVE-2014-1743: Use-after-free in styles
* CVE-2014-1744: Integer overflow in audio
* CVE-2014-1745: Use-after-free in SVG
* CVE-2014-1746: Out-of-bounds read in media filters
* CVE-2014-1747: UXSS with local MHTML file
* CVE-2014-1748: UI spoofing with scrollbar
* CVE-2014-1749: Various fixes from internal audits, fuzzing and other initiatives
* CVE-2014-3152: Integer underflow in V8 fixed
* CVE-2014-1740: Use-after-free in WebSockets
* CVE-2014-1741: Integer overflow in DOM range
* CVE-2014-1742: Use-after-free in editing
and 17 more for which no detailed information is given.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096494" comment="chromedriver-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096495" comment="chromium-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096496" comment="chromium-desktop-gnome-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096497" comment="chromium-desktop-kde-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096498" comment="chromium-ffmpegsumo-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096499" comment="chromium-suid-helper-35.0.1916.114-1.45.4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096500" comment="ninja-3.0+git.20130603.0f53fd3-2.6.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:333" version="1" class="patch">
	<metadata>
		<title>apache2-mod_wsgi: Fix for two security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
apache2-mod_wsgi was updated to fix two security issues.

These security issues were fixed: 
- Information exposure (CVE-2014-0242)
- Local privilege escalation (CVE-2014-0240)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096501" comment="apache2-mod_wsgi-3.3-12.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096502" comment="apache2-mod_wsgi-3.4-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:334" version="1" class="patch">
	<metadata>
		<title>libxml2, python-libxml2: Reverted patch for CVE-2014-0191</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Removed fix for CVE-2014-0191. This fix breaks existing applications and there's currently no way to prevent that.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096198" comment="libxml2-2-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096199" comment="libxml2-2-32bit-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096200" comment="libxml2-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096201" comment="libxml2-devel-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096202" comment="libxml2-devel-32bit-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096203" comment="libxml2-doc-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096204" comment="libxml2-tools-2.9.0-2.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096205" comment="python-libxml2-2.9.0-2.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:335" version="1" class="patch">
	<metadata>
		<title>gnutls: Fixed possible memory corruption and NULL pointer dereference</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
gnutls was patched to fix two security vulnerabilities that could be used to disrupt service or potentially allow remote
code execution.

- Memory corruption during connect (CVE-2014-3466)
- NULL pointer dereference in gnutls_x509_dn_oid_name (CVE-2014-3465)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096337" comment="gnutls-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096338" comment="libgnutls-devel-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096339" comment="libgnutls-devel-32bit-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096340" comment="libgnutls-openssl-devel-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096341" comment="libgnutls-openssl27-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096342" comment="libgnutls28-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096343" comment="libgnutls28-32bit-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096344" comment="libgnutlsxx-devel-3.0.28-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096345" comment="libgnutlsxx28-3.0.28-1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:336" version="1" class="patch">
	<metadata>
		<title>php5: Update fixes several security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
php5 was updated to fix several security issues.

These issues were fixed:
* Performance degradation by too many file_printf calls (CVE-2014-0237)
* DoS in Fileinfo component (CVE-2014-0238)
* NULL pointer dereference in GD XPM decoder (CVE-2014-2497)
* Privilege escalation due to insecure default config (CVE-2014-0185)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096503" comment="apache2-mod_php5-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096504" comment="php5-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096505" comment="php5-bcmath-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096506" comment="php5-bz2-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096507" comment="php5-calendar-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096508" comment="php5-ctype-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096509" comment="php5-curl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096510" comment="php5-dba-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096511" comment="php5-devel-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096512" comment="php5-dom-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096513" comment="php5-enchant-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096514" comment="php5-exif-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096515" comment="php5-fastcgi-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096516" comment="php5-fileinfo-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096517" comment="php5-fpm-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096518" comment="php5-ftp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096519" comment="php5-gd-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096520" comment="php5-gettext-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096521" comment="php5-gmp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096522" comment="php5-iconv-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096523" comment="php5-imap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096524" comment="php5-intl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096525" comment="php5-json-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096526" comment="php5-ldap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096527" comment="php5-mbstring-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096528" comment="php5-mcrypt-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096529" comment="php5-mssql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096530" comment="php5-mysql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096531" comment="php5-odbc-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096532" comment="php5-openssl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096533" comment="php5-pcntl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096534" comment="php5-pdo-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096535" comment="php5-pear-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096536" comment="php5-pgsql-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096537" comment="php5-phar-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096538" comment="php5-posix-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096539" comment="php5-pspell-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096540" comment="php5-readline-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096541" comment="php5-shmop-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096542" comment="php5-snmp-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096543" comment="php5-soap-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096544" comment="php5-sockets-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096545" comment="php5-sqlite-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096546" comment="php5-suhosin-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096547" comment="php5-sysvmsg-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096548" comment="php5-sysvsem-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096549" comment="php5-sysvshm-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096550" comment="php5-tidy-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096551" comment="php5-tokenizer-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096552" comment="php5-wddx-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096553" comment="php5-xmlreader-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096554" comment="php5-xmlrpc-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096555" comment="php5-xmlwriter-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096556" comment="php5-xsl-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096557" comment="php5-zip-5.3.17-3.12.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096558" comment="php5-zlib-5.3.17-3.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:337" version="1" class="patch">
	<metadata>
		<title>openssl: update to version 1.0.1h</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The openssl library was updated to version 1.0.1h fixing
various security issues and bugs:

Security issues fixed:
- CVE-2014-0224: Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted
  handshake can force the use of weak keying material in OpenSSL
  SSL/TLS clients and servers.
- CVE-2014-0221: Fix DTLS recursion flaw. By sending an invalid DTLS handshake to an
  OpenSSL DTLS client the code can be made to recurse eventually crashing
  in a DoS attack.
- CVE-2014-0195: Fix DTLS invalid fragment vulnerability. A buffer
  overrun attack can be triggered by sending invalid DTLS fragments to
  an OpenSSL DTLS client or server. This is potentially exploitable to
  run arbitrary code on a vulnerable client or server.
- CVE-2014-3470: Fix bug in TLS code where clients enable anonymous
  ECDH ciphersuites are subject to a denial of service attack.
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096346" comment="libopenssl-devel-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096347" comment="libopenssl-devel-32bit-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096348" comment="libopenssl1_0_0-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096349" comment="libopenssl1_0_0-32bit-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096350" comment="openssl-1.0.1h-1.60.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096351" comment="openssl-doc-1.0.1h-1.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:338" version="1" class="patch">
	<metadata>
		<title>sendmail: Close file descriptors before executing programs</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
sendmail was updated to properly close file descriptors before executing programs.

These security issues were fixed:
- Not properly closing file descriptors before executing programs (CVE-2014-3956).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096676" comment="rmail-8.14.3-85.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096677" comment="sendmail-8.14.5-85.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096678" comment="sendmail-devel-8.14.5-85.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096679" comment="uucp-1.07-85.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:339" version="1" class="patch">
	<metadata>
		<title>typo3-cms-4_5: Update to 4.5.34 to fix eight security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
typo3-cms-4_5 was updated to version 4.5.34 to fix eight security vulnerabilities and several other bugs.

These security problems where fixed:
* Add trusted HTTP_HOST configuration (CVE-2014-3941)
* XSS in (old) extension manager information function (CVE-2014-3943)
* XSS in new content element wizard (CVE-2014-3943)
* XSS in template tools on root page (CVE-2014-3943)
* XSS in Backend Layout Wizard (CVE-2014-3943)
* Encode URL for use in JavaScript (CVE-2014-3943)
* Fix insecure unserialize in colorpicker (CVE-2014-3942)
* Remove charts.swf to get rid of XSS vulnerability (CVE-2014-3943)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096690" comment="typo3-cms-4_5-4.5.34-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:340" version="1" class="patch">
	<metadata>
		<title>rxvt-unicode: Enforce secure handling of window property values</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
rxvt-unicode was patched to ensure that 
window property values can not be queried in secure mode (CVE-2014-3121).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096691" comment="rxvt-unicode-9.15-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:341" version="1" class="patch">
	<metadata>
		<title>miniupnpc: Update to 1.9 to fix buffer overflow</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
miniupnpc was updated to 1.9 to fix a
potential buffer overrun in miniwget.c (CVE-2014-3985).

Besides that the following issues were fixed:
* added argument remoteHost to UPNP_GetSpecificPortMappingEntry()
* increment API_VERSION to 10
* --help and -h arguments in upnpc.c
* define MAXHOSTNAMELEN if not already done
* update upnpreplyparse to allow larger values (128 chars instead of 64) 
* Update upnpreplyparse to take into account &amp;quot;empty&amp;quot; elements
* validate upnpreplyparse.c code with &amp;quot;make check&amp;quot;
* Fix Solaris build thanks to Maciej Małecki
* Fix testminiwget.sh for BSD
* Fixed Makefile for *BSD
* Update Makefile to use JNAerator version 0.11
* Fix testminiwget.sh for use with dash
* Use $(DESTDIR) in Makefile
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096692" comment="libminiupnpc-devel-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096693" comment="libminiupnpc10-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096694" comment="miniupnpc-1.9-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096695" comment="python-miniupnpc-1.9-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:342" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox, mozilla-nspr: Update fixes nine security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
mozilla-nspr was updated to version 4.10.6 to fix one security issue:
* OOB write with sprintf and console functions (CVE-2014-1545)

MozillaFirefox was updated to version 30.0 to fix eight security issues:
* Miscellaneous memory safety hazards (CVE-2014-1533/CVE-2014-1534)
* Use-after-free and out of bounds issues found using Address Sanitizer (CVE-2014-1536/CVE-2014-1537/CVE-2014-1538)
* Use-after-free in Event Listener Manager (CVE-2014-1540)
* Use-after-free with SMIL Animation Controller (CVE-2014-1541)
* Buffer overflow in Web Audio Speex resampler (CVE-2014-1542)

Several non-security bugs were also fixed in this release.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096761" comment="MozillaFirefox-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096762" comment="MozillaFirefox-branding-upstream-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096763" comment="MozillaFirefox-buildsymbols-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096764" comment="MozillaFirefox-devel-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096765" comment="MozillaFirefox-translations-common-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096766" comment="MozillaFirefox-translations-other-30.0-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096767" comment="mozilla-nspr-32bit-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096768" comment="mozilla-nspr-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096769" comment="mozilla-nspr-devel-4.10.6-1.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096770" comment="libfreebl3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096771" comment="libfreebl3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096772" comment="libsoftokn3-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096773" comment="libsoftokn3-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096774" comment="mozilla-nss-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096775" comment="mozilla-nss-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096776" comment="mozilla-nss-certs-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096777" comment="mozilla-nss-certs-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096778" comment="mozilla-nss-devel-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096779" comment="mozilla-nss-sysinit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096780" comment="mozilla-nss-sysinit-32bit-3.16-1.39.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096781" comment="mozilla-nss-tools-3.16-1.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:343" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird: Update fixes six security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
MozillaThunderbird was updated to version 24.6.0 to fix six security issues:
* Miscellaneous memory safety hazards (CVE-2014-1533/CVE-2014-1534)
* Use-after-free and out of bounds issues found using Address Sanitizer (CVE-2014-1536/CVE-2014-1537/CVE-2014-1538)
* Use-after-free with SMIL Animation Controller (CVE-2014-1541)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097165" comment="MozillaThunderbird-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097166" comment="MozillaThunderbird-buildsymbols-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097167" comment="MozillaThunderbird-devel-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097168" comment="MozillaThunderbird-translations-common-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097169" comment="MozillaThunderbird-translations-other-24.6.0-61.51.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097170" comment="enigmail-1.6.0+24.6.0-61.51.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:344" version="1" class="patch">
	<metadata>
		<title>dbus-1: Fixed possible DoS</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
dbus-1 was updated to fix a possible DoS (CVE-2014-3477).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096782" comment="dbus-1-x11-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096783" comment="dbus-1-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096784" comment="dbus-1-32bit-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096785" comment="dbus-1-devel-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096786" comment="dbus-1-devel-32bit-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096787" comment="dbus-1-devel-doc-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096788" comment="libdbus-1-3-1.6.8-2.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096789" comment="libdbus-1-3-32bit-1.6.8-2.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:345" version="1" class="patch">
	<metadata>
		<title>ctdb: Upgrade to version 2.3 to fix one security issue</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
ctdb was updated to version 2.3 to fix several temp 
file vulnerabilities (CVE-2013-4159). Various other bugs were fixed by this upgrade, most notably
bnc#867815: Avoid lockwait congestion by using an overflow queue. 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096913" comment="ctdb-2.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096914" comment="ctdb-devel-2.3-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096915" comment="ctdb-pcp-pmda-2.3-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:346" version="1" class="patch">
	<metadata>
		<title>castor: Prevent XXE attacks</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
castor was updated to prevent XXE attacks via crafted XML documents (CVE-2014-3004).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096790" comment="castor-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096791" comment="castor-demo-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096792" comment="castor-doc-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096793" comment="castor-javadoc-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096794" comment="castor-test-0.9.5-317.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096795" comment="castor-xml-0.9.5-317.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:347" version="1" class="patch">
	<metadata>
		<title>kernel: security and bugfix release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The Linux kernel was updated to fix security issues and bugs:

Security issues fixed:
CVE-2014-3153: The futex_requeue function in kernel/futex.c in the Linux
kernel did not ensure that calls have two different futex addresses,
which allowed local users to gain privileges via a crafted FUTEX_REQUEUE
command that facilitates unsafe waiter modification.

CVE-2014-0077: drivers/vhost/net.c in the Linux kernel, when mergeable
buffers are disabled, did not properly validate packet lengths, which
allowed guest OS users to cause a denial of service (memory corruption
and host OS crash) or possibly gain privileges on the host OS via crafted
packets, related to the handle_rx and get_rx_bufs functions.

CVE-2014-0055: The get_rx_bufs function in drivers/vhost/net.c in the
vhost-net subsystem in the Linux kernel package did not properly handle
vhost_get_vq_desc errors, which allowed guest OS users to cause a denial
of service (host OS crash) via unspecified vectors.

CVE-2014-2678: The rds_iw_laddr_check function in net/rds/iw.c in the
Linux kernel allowed local users to cause a denial of service (NULL
pointer dereference and system crash) or possibly have unspecified other
impact via a bind system call for an RDS socket on a system that lacks
RDS transports.

CVE-2013-7339: The rds_ib_laddr_check function in net/rds/ib.c in the
Linux kernel allowed local users to cause a denial of service (NULL
pointer dereference and system crash) or possibly have unspecified other
impact via a bind system call for an RDS socket on a system that lacks
RDS transports.

CVE-2014-2851: Integer overflow in the ping_init_sock function in
net/ipv4/ping.c in the Linux kernel allowed local users to cause a denial
of service (use-after-free and system crash) or possibly gain privileges
via a crafted application that leverages an improperly managed reference
counter.

CVE-2014-3122: The try_to_unmap_cluster function in mm/rmap.c in the Linux
kernel did not properly consider which pages must be locked, which allowed
local users to cause a denial of service (system crash) by triggering
a memory-usage pattern that requires removal of page-table mappings.

Bugs fixed:
- memcg: deprecate memory.force_empty knob (bnc#878274).

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097171" comment="kernel-debug-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097172" comment="kernel-debug-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097173" comment="kernel-debug-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097174" comment="kernel-default-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097175" comment="kernel-default-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097176" comment="kernel-default-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097177" comment="kernel-desktop-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097178" comment="kernel-desktop-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097179" comment="kernel-desktop-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097180" comment="kernel-docs-3.7.10-1.36.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097181" comment="kernel-ec2-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097182" comment="kernel-ec2-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097183" comment="kernel-ec2-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097184" comment="kernel-pae-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097185" comment="kernel-pae-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097186" comment="kernel-pae-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097187" comment="kernel-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097188" comment="kernel-source-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097189" comment="kernel-source-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097190" comment="kernel-syms-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097191" comment="kernel-trace-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097192" comment="kernel-trace-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097193" comment="kernel-trace-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097194" comment="kernel-vanilla-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097195" comment="kernel-vanilla-devel-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097196" comment="kernel-xen-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097197" comment="kernel-xen-base-3.7.10-1.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097198" comment="kernel-xen-devel-3.7.10-1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:348" version="1" class="patch">
	<metadata>
		<title>seamonkey: Update fixes nine security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
seamonkey was updated to version 2.26.1 to fix nine security issues.

These security issues were fixed:

* Miscellaneous memory safety hazards (CVE-2014-1533/CVE-2014-1534)
* Use-after-free and out of bounds issues found using Address Sanitizer (CVE-2014-1536/CVE-2014-1537/CVE-2014-1538)
* Use-after-free in Event Listener Manager (CVE-2014-1540)
* Use-after-free with SMIL Animation Controller (CVE-2014-1541)
* Buffer overflow in Web Audio Speex resampler (CVE-2014-1542)
* Out of bounds write in NSPR (CVE-2014-1545)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097199" comment="seamonkey-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097200" comment="seamonkey-dom-inspector-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097201" comment="seamonkey-irc-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097202" comment="seamonkey-translations-common-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097203" comment="seamonkey-translations-other-2.26.1-1.53.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097204" comment="seamonkey-venkman-2.26.1-1.53.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:349" version="1" class="patch">
	<metadata>
		<title>php5: Update to prevent insecure DNS TXT record parsing</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
php5 was updated to prevent insecure DNS TXT record parsing.

This security issue was fixed:
- Heap-based buffer overflow in DNS TXT record parsing (CVE-2014-4049)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009096916" comment="apache2-mod_php5-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096917" comment="php5-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096918" comment="php5-bcmath-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096919" comment="php5-bz2-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096920" comment="php5-calendar-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096921" comment="php5-ctype-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096922" comment="php5-curl-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096923" comment="php5-dba-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096924" comment="php5-devel-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096925" comment="php5-dom-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096926" comment="php5-enchant-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096927" comment="php5-exif-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096928" comment="php5-fastcgi-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096929" comment="php5-fileinfo-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096930" comment="php5-fpm-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096931" comment="php5-ftp-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096932" comment="php5-gd-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096933" comment="php5-gettext-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096934" comment="php5-gmp-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096935" comment="php5-iconv-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096936" comment="php5-imap-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096937" comment="php5-intl-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096938" comment="php5-json-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096939" comment="php5-ldap-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096940" comment="php5-mbstring-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096941" comment="php5-mcrypt-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096942" comment="php5-mssql-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096943" comment="php5-mysql-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096944" comment="php5-odbc-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096945" comment="php5-openssl-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096946" comment="php5-pcntl-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096947" comment="php5-pdo-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096948" comment="php5-pear-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096949" comment="php5-pgsql-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096950" comment="php5-phar-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096951" comment="php5-posix-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096952" comment="php5-pspell-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096953" comment="php5-readline-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096954" comment="php5-shmop-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096955" comment="php5-snmp-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096956" comment="php5-soap-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096957" comment="php5-sockets-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096958" comment="php5-sqlite-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096959" comment="php5-suhosin-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096960" comment="php5-sysvmsg-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096961" comment="php5-sysvsem-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096962" comment="php5-sysvshm-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096963" comment="php5-tidy-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096964" comment="php5-tokenizer-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096965" comment="php5-wddx-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096966" comment="php5-xmlreader-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096967" comment="php5-xmlrpc-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096968" comment="php5-xmlwriter-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096969" comment="php5-xsl-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096970" comment="php5-zip-5.3.17-3.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009096971" comment="php5-zlib-5.3.17-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:350" version="1" class="patch">
	<metadata>
		<title>xalan-j2: Ensure secure processing</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
xalan-j2 was updated to ensure secure processing can't be circumvented (CVE-2014-0107).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097205" comment="xalan-j2-2.7.0-259.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097206" comment="xalan-j2-demo-2.7.0-259.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097207" comment="xalan-j2-javadoc-2.7.0-259.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097208" comment="xalan-j2-manual-2.7.0-259.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097209" comment="xalan-j2-xsltc-2.7.0-259.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:351" version="1" class="patch">
	<metadata>
		<title>samba: Three security updates</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
samba was updated to fix three security issues and two non-security issues.
	  
These security issues were fixed:
- Fix segmentation fault in smbd_marshall_dir_entry()'s SMB_FIND_FILE_UNIX handler (CVE-2014-3493)
- Fix nmbd denial of service (CVE-2014-0244)
- Fix malformed FSCTL_SRV_ENUMERATE_SNAPSHOTS response (CVE-2014-0178)

These non-security issues were fixed:
- Fix printer job purging; (bso#10612); (bnc#879390).
- Package the get_printing_ticket binary with 0700 permissions on post-11.4 systems; (bnc#685093).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097210" comment="samba-doc-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097211" comment="libnetapi-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097212" comment="libnetapi0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097213" comment="libsmbclient-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097214" comment="libsmbclient0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097215" comment="libsmbclient0-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097216" comment="libsmbsharemodes-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097217" comment="libsmbsharemodes0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097218" comment="libwbclient-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097219" comment="libwbclient0-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097220" comment="libwbclient0-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097221" comment="samba-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097222" comment="samba-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097223" comment="samba-client-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097224" comment="samba-client-32bit-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097225" comment="samba-devel-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097226" comment="samba-krb-printing-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097227" comment="samba-winbind-3.6.12-59.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097228" comment="samba-winbind-32bit-3.6.12-59.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:352" version="1" class="patch">
	<metadata>
		<title>freerdp: Fixes for integer overflows</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
freerdp was patched to fix several integer overflows.

These security issues were fixed:
* Integer overflow (CVE-2014-0791)
* Integer overflows in memory allocations in client/X11/xf_graphics.c (CVE-2014-0250)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097229" comment="freerdp-1.0.2-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097230" comment="freerdp-devel-1.0.2-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097231" comment="libfreerdp-1_0-1.0.2-11.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097232" comment="libfreerdp-1_0-plugins-1.0.2-11.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:353" version="1" class="patch">
	<metadata>
		<title>memcached: Update fixes fixe security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
memcached was updated to version 1.4.20 to fix five security issues.

These security issues were fixed:

- DoS when printing out keys to be deleted in  verbose mode (CVE-2013-0179)
- Remote DoS (crash) via a request that triggers &amp;quot;unbounded key print&amp;quot; (CVE-2013-7291)
- Remote DoS (segmentation fault) via a request to delete a key (CVE-2013-7290)
- SASL authentication allows wrong credentials to access memcache (CVE-2013-7239)
- Remote DoS (CVE-2011-4971)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097488" comment="memcached-1.4.20-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:354" version="1" class="patch">
	<metadata>
		<title>gpg2: Fixed possible DoS</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
gpg2 was patched to fix a possible DoS.

This security issue was fixed:

- Denial of service through infinite loop with garbled compressed data packets (CVE-2014-4617)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097489" comment="gpg2-2.0.19-5.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097490" comment="gpg2-lang-2.0.19-5.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:355" version="1" class="patch">
	<metadata>
		<title>python, python3: Fixed JSON module</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
python and python3 were updated to fix one security issue.

This security issue was fixed:

- Missing boundary check in JSON module (CVE-2014-4616)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009097806" comment="libpython2_7-1_0-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097807" comment="libpython2_7-1_0-32bit-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097808" comment="python-base-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097809" comment="python-base-32bit-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097810" comment="python-devel-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097811" comment="python-xml-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097812" comment="python-doc-2.7-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097813" comment="python-doc-pdf-2.7-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097814" comment="python-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097815" comment="python-32bit-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097816" comment="python-curses-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097817" comment="python-demo-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097818" comment="python-gdbm-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097819" comment="python-idle-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097820" comment="python-tk-2.7.3-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097821" comment="libpython3_3m1_0-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097822" comment="libpython3_3m1_0-32bit-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097823" comment="python3-base-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097824" comment="python3-base-32bit-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097825" comment="python3-devel-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097826" comment="python3-idle-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097827" comment="python3-testsuite-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097828" comment="python3-tools-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097829" comment="python3-doc-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097830" comment="python3-doc-pdf-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097831" comment="python3-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097832" comment="python3-32bit-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097833" comment="python3-curses-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097834" comment="python3-dbm-3.3.0-6.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009097835" comment="python3-tk-3.3.0-6.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:356" version="1" class="patch">
	<metadata>
		<title>php, php5, php53: fixes several security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes the following security issues with php, php5 and php53:
    
- bnc#884986, CVE-2014-0207: file: php5: cdf_read_short_sector insufficient boundary check 
- bnc#884987, CVE-2014-3478: file: mconvert incorrect handling of truncated pascal string size 
- bnc#884989, CVE-2014-3479: php53: file: cdf_check_stream_offset insufficient boundary check 
- bnc#884990, CVE-2014-3480: php53: file: cdf_count_chain insufficient boundary check 
- bnc#884991, CVE-2014-3487: php53: file: cdf_read_property_info insufficient boundary check 
- bnc#884992, CVE-2014-3515: php5: unserialize() SPL ArrayObject / SPLObjectStorage Type Confusion 
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098175" comment="apache2-mod_php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098176" comment="php5-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098177" comment="php5-bcmath-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098178" comment="php5-bz2-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098179" comment="php5-calendar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098180" comment="php5-ctype-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098181" comment="php5-curl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098182" comment="php5-dba-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098183" comment="php5-devel-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098184" comment="php5-dom-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098185" comment="php5-enchant-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098186" comment="php5-exif-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098187" comment="php5-fastcgi-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098188" comment="php5-fileinfo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098189" comment="php5-fpm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098190" comment="php5-ftp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098191" comment="php5-gd-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098192" comment="php5-gettext-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098193" comment="php5-gmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098194" comment="php5-iconv-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098195" comment="php5-imap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098196" comment="php5-intl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098197" comment="php5-json-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098198" comment="php5-ldap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098199" comment="php5-mbstring-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098200" comment="php5-mcrypt-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098201" comment="php5-mssql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098202" comment="php5-mysql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098203" comment="php5-odbc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098204" comment="php5-openssl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098205" comment="php5-pcntl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098206" comment="php5-pdo-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098207" comment="php5-pear-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098208" comment="php5-pgsql-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098209" comment="php5-phar-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098210" comment="php5-posix-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098211" comment="php5-pspell-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098212" comment="php5-readline-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098213" comment="php5-shmop-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098214" comment="php5-snmp-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098215" comment="php5-soap-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098216" comment="php5-sockets-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098217" comment="php5-sqlite-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098218" comment="php5-suhosin-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098219" comment="php5-sysvmsg-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098220" comment="php5-sysvsem-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098221" comment="php5-sysvshm-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098222" comment="php5-tidy-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098223" comment="php5-tokenizer-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098224" comment="php5-wddx-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098225" comment="php5-xmlreader-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098226" comment="php5-xmlrpc-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098227" comment="php5-xmlwriter-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098228" comment="php5-xsl-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098229" comment="php5-zip-5.3.17-3.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098230" comment="php5-zlib-5.3.17-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:357" version="1" class="patch">
	<metadata>
		<title>lzo, liblzo-2-2: fix security issue.</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
bnc#883947: CVE-2014-4607: lzo: DoS or possible RCE by allowing an attacker to change controllflow		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098231" comment="liblzo2-2-2.06-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098232" comment="liblzo2-2-32bit-2.06-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098233" comment="lzo-2.06-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098234" comment="lzo-devel-2.06-9.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098235" comment="lzo-devel-32bit-2.06-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:358" version="1" class="patch">
	<metadata>
		<title>dbus-1: fixes several security issues</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
CVE-2014-3532 denial of service in file descriptor passing feature

CVE-2014-3533 local denial of service (force system services to exit)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098236" comment="dbus-1-x11-1.6.8-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098237" comment="dbus-1-1.6.8-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098238" comment="dbus-1-32bit-1.6.8-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098239" comment="dbus-1-devel-1.6.8-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098240" comment="dbus-1-devel-32bit-1.6.8-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098241" comment="dbus-1-devel-doc-1.6.8-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098242" comment="libdbus-1-3-1.6.8-2.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098243" comment="libdbus-1-3-32bit-1.6.8-2.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:359" version="1" class="patch">
	<metadata>
		<title>eet: fix security issue</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- lz4.patch
  security fix for CVE-2014-4611
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098244" comment="eet-1.7.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098245" comment="eet-devel-1.7.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098246" comment="eet-doc-html-1.7.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098247" comment="eet-examples-1.7.5-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098248" comment="libeet1-1.7.5-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:360" version="1" class="patch">
	<metadata>
		<title>php5: security fixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

php5 was updated to fix security issues:

CVE-2014-4670: Use-after-free vulnerability in ext/spl/spl_dllist.c in
the SPL component in PHP allowed context-dependent attackers to cause a
denial of service or possibly have unspecified other impact via crafted
iterator usage within applications in certain web-hosting environments. 

CVE-2014-4698: Use-after-free vulnerability in ext/spl/spl_array.c
in the SPL component in PHP allowed context-dependent attackers to
cause a denial of service or possibly have unspecified other impact via
crafted ArrayIterator usage within applications in certain web-hosting
environments.

CVE-2014-4721: The phpinfo implementation in ext/standard/info.c in
PHP did not ensure use of the string data type for the PHP_AUTH_PW,
PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow
context-dependent attackers to obtain sensitive information from process
memory by using the integer data type with crafted values, related to a
&amp;quot;type confusion&amp;quot; vulnerability, as demonstrated by reading a private
SSL key in an Apache HTTP Server web-hosting environment with mod_ssl
and a PHP 5.3.x mod_php. 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099056" comment="apache2-mod_php5-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099057" comment="php5-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099058" comment="php5-bcmath-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099059" comment="php5-bz2-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099060" comment="php5-calendar-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099061" comment="php5-ctype-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099062" comment="php5-curl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099063" comment="php5-dba-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099064" comment="php5-devel-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099065" comment="php5-dom-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099066" comment="php5-enchant-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099067" comment="php5-exif-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099068" comment="php5-fastcgi-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099069" comment="php5-fileinfo-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099070" comment="php5-fpm-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099071" comment="php5-ftp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099072" comment="php5-gd-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099073" comment="php5-gettext-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099074" comment="php5-gmp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099075" comment="php5-iconv-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099076" comment="php5-imap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099077" comment="php5-intl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099078" comment="php5-json-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099079" comment="php5-ldap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099080" comment="php5-mbstring-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099081" comment="php5-mcrypt-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099082" comment="php5-mssql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099083" comment="php5-mysql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099084" comment="php5-odbc-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099085" comment="php5-openssl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099086" comment="php5-pcntl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099087" comment="php5-pdo-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099088" comment="php5-pear-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099089" comment="php5-pgsql-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099090" comment="php5-phar-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099091" comment="php5-posix-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099092" comment="php5-pspell-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099093" comment="php5-readline-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099094" comment="php5-shmop-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099095" comment="php5-snmp-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099096" comment="php5-soap-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099097" comment="php5-sockets-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099098" comment="php5-sqlite-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099099" comment="php5-suhosin-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099100" comment="php5-sysvmsg-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099101" comment="php5-sysvsem-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099102" comment="php5-sysvshm-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099103" comment="php5-tidy-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099104" comment="php5-tokenizer-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099105" comment="php5-wddx-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099106" comment="php5-xmlreader-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099107" comment="php5-xmlrpc-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099108" comment="php5-xmlwriter-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099109" comment="php5-xsl-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099110" comment="php5-zip-5.3.17-3.25.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099111" comment="php5-zlib-5.3.17-3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:361" version="1" class="patch">
	<metadata>
		<title>ntp: adjust default config against distributed denial of service attack</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The NTP time service could be used for remote denial of service amplification attacks.

This issue can be fixed by the administrator as we described in our security advisory
SUSE-SA:2014:001
http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00005.html

and on http://support.novell.com/security/cve/CVE-2013-5211.html

This update now also replaces the default ntp.conf template to fix this problem.

Please note that if you have touched or modified ntp.conf yourself, it will not be automatically fixed, you need to merge the changes manually as described.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099112" comment="ntp-4.2.6p5-9.6.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099113" comment="ntp-doc-4.2.6p5-9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:362" version="1" class="patch">
	<metadata>
		<title>kernel: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The Linux Kernel was updated to fix various bugs and security issues.

CVE-2014-4699: The Linux kernel on Intel processors did not properly
restrict use of a non-canonical value for the saved RIP address in the
case of a system call that does not use IRET, which allowed local users
to leverage a race condition and gain privileges, or cause a denial of
service (double fault), via a crafted application that makes ptrace and
fork system calls.

CVE-2014-4667: The sctp_association_free function in net/sctp/associola.c
in the Linux kernel did not properly manage a certain backlog value,
which allowed remote attackers to cause a denial of service (socket
outage) via a crafted SCTP packet.

CVE-2014-4171: mm/shmem.c in the Linux kernel did not properly implement
the interaction between range notification and hole punching, which
allowed local users to cause a denial of service (i_mutex hold) by using
the mmap system call to access a hole, as demonstrated by interfering
with intended shmem activity by blocking completion of (1) an MADV_REMOVE
madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on 32-bit
x86 platforms, when syscall auditing is enabled and the sep CPU feature
flag is set, allowed local users to cause a denial of service (OOPS
and system crash) via an invalid syscall number, as demonstrated by
number 1000.

CVE-2014-4656: Multiple integer overflows in sound/core/control.c in
the ALSA control implementation in the Linux kernel allowed local users
to cause a denial of service by leveraging /dev/snd/controlCX access,
related to (1) index values in the snd_ctl_add function and (2) numid
values in the snd_ctl_remove_numid_conflict function.

CVE-2014-4655: The snd_ctl_elem_add function in sound/core/control.c in
the ALSA control implementation in the Linux kernel did not properly
maintain the user_ctl_count value, which allowed local users to
cause a denial of service (integer overflow and limit bypass)
by leveraging /dev/snd/controlCX access for a large number of
SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.

CVE-2014-4654: The snd_ctl_elem_add function in sound/core/control.c
in the ALSA control implementation in the Linux kernel did not check
authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allowed
local users to remove kernel controls and cause a denial of service
(use-after-free and system crash) by leveraging /dev/snd/controlCX access
for an ioctl call.

CVE-2014-4653: sound/core/control.c in the ALSA control implementation
in the Linux kernel did not ensure possession of a read/write lock,
which allowed local users to cause a denial of service (use-after-free)
and obtain sensitive information from kernel memory by leveraging
/dev/snd/controlCX access.

CVE-2014-4652: Race condition in the tlv handler functionality in the
snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control
implementation in the Linux kernel allowed local users to obtain sensitive
information from kernel memory by leveraging /dev/snd/controlCX access.

CVE-2014-4014: The capabilities implementation in the Linux kernel
did not properly consider that namespaces are inapplicable to inodes,
which allowed local users to bypass intended chmod restrictions by first
creating a user namespace, as demonstrated by setting the setgid bit on
a file with group ownership of root.

CVE-2014-2309: The ip6_route_add function in net/ipv6/route.c in the
Linux kernel did not properly count the addition of routes, which allowed
remote attackers to cause a denial of service (memory consumption)
via a flood of ICMPv6 Router Advertisement packets.

CVE-2014-3917: kernel/auditsc.c in the Linux kernel, when
CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allowed local
users to obtain potentially sensitive single-bit values from kernel memory
or cause a denial of service (OOPS) via a large value of a syscall number.

CVE-2014-0131: Use-after-free vulnerability in the skb_segment function
in net/core/skbuff.c in the Linux kernel allowed attackers to obtain
sensitive information from kernel memory by leveraging the absence of
a certain orphaning operation.

CVE-2014-3144: The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST
extension implementations in the sk_run_filter function in
net/core/filter.c in the Linux kernel did not check whether a certain
length value is sufficiently large, which allowed local users to cause
a denial of service (integer underflow and system crash) via crafted BPF
instructions.

CVE-2014-3145: The BPF_S_ANC_NLATTR_NEST extension implementation in
the sk_run_filter function in net/core/filter.c in the Linux kernel
used the reverse order in a certain subtraction, which allowed local
users to cause a denial of service (over-read and system crash) via
crafted BPF instructions. NOTE: the affected code was moved to the
__skb_get_nlattr_nest function before the vulnerability was announced.

Additional Bug fixed:
- HID: logitech-dj: Fix USB 3.0 issue (bnc#788080).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099206" comment="kernel-debug-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099207" comment="kernel-debug-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099208" comment="kernel-debug-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099209" comment="kernel-default-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099210" comment="kernel-default-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099211" comment="kernel-default-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099212" comment="kernel-desktop-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099213" comment="kernel-desktop-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099214" comment="kernel-desktop-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099215" comment="kernel-docs-3.7.10-1.40.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099216" comment="kernel-ec2-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099217" comment="kernel-ec2-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099218" comment="kernel-ec2-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099219" comment="kernel-pae-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099220" comment="kernel-pae-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099221" comment="kernel-pae-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099222" comment="kernel-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099223" comment="kernel-source-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099224" comment="kernel-source-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099225" comment="kernel-syms-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099226" comment="kernel-trace-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099227" comment="kernel-trace-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099228" comment="kernel-trace-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099229" comment="kernel-vanilla-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099230" comment="kernel-vanilla-devel-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099231" comment="kernel-xen-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099232" comment="kernel-xen-base-3.7.10-1.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099233" comment="kernel-xen-devel-3.7.10-1.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:363" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox: Update to Mozilla Firefox 31</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

MozillaFirefox was updated to version 31 to fix various security issues and bugs:

* MFSA 2014-56/CVE-2014-1547/CVE-2014-1548
  Miscellaneous memory safety hazards
* MFSA 2014-57/CVE-2014-1549 (bmo#1020205)
  Buffer overflow during Web Audio buffering for playback
* MFSA 2014-58/CVE-2014-1550 (bmo#1020411)
  Use-after-free in Web Audio due to incorrect control message ordering
* MFSA 2014-60/CVE-2014-1561 (bmo#1000514, bmo#910375)
  Toolbar dialog customization event spoofing
* MFSA 2014-61/CVE-2014-1555 (bmo#1023121)
  Use-after-free with FireOnStateChange event
* MFSA 2014-62/CVE-2014-1556 (bmo#1028891)
  Exploitable WebGL crash with Cesium JavaScript library
* MFSA 2014-63/CVE-2014-1544 (bmo#963150)
  Use-after-free while when manipulating certificates in the trusted cache
  (solved with NSS 3.16.2 requirement)
* MFSA 2014-64/CVE-2014-1557 (bmo#913805)
  Crash in Skia library when scaling high quality images
* MFSA 2014-65/CVE-2014-1558/CVE-2014-1559/CVE-2014-1560
  (bmo#1015973, bmo#1026022, bmo#997795)
  Certificate parsing broken by non-standard character encoding
* MFSA 2014-66/CVE-2014-1552 (bmo#985135)
  IFRAME sandbox same-origin access through redirect

Mozilla-nss was updated to 3.16.3:
New Functions:
* CERT_GetGeneralNameTypeFromString (This function was already added
  in NSS 3.16.2, however, it wasn't declared in a public header file.)
Notable Changes:
* The following 1024-bit CA certificates were removed
  - Entrust.net Secure Server Certification Authority
  - GTE CyberTrust Global Root
  - ValiCert Class 1 Policy Validation Authority
  - ValiCert Class 2 Policy Validation Authority
  - ValiCert Class 3 Policy Validation Authority
* Additionally, the following CA certificate was removed as
  requested by the CA:
  - TDC Internet Root CA
* The following CA certificates were added:
  - Certification Authority of WoSign
  - CA 沃通根证书
  - DigiCert Assured ID Root G2
  - DigiCert Assured ID Root G3
  - DigiCert Global Root G2
  - DigiCert Global Root G3
  - DigiCert Trusted Root G4
  - QuoVadis Root CA 1 G3
  - QuoVadis Root CA 2 G3
  - QuoVadis Root CA 3 G3
* The Trust Bits were changed for the following CA certificates
  - Class 3 Public Primary Certification Authority
  - Class 3 Public Primary Certification Authority
  - Class 2 Public Primary Certification Authority - G2
  - VeriSign Class 2 Public Primary Certification Authority - G3
  - AC Ra?z Certic?mara S.A.
  - NetLock Uzleti (Class B) Tanusitvanykiado
  - NetLock Expressz (Class C) Tanusitvanykiado
changes in 3.16.2
  New functionality:
* DTLS 1.2 is supported.
* The TLS application layer protocol negotiation (ALPN) extension
  is also supported on the server side.
* RSA-OEAP is supported. Use the new PK11_PrivDecrypt and
  PK11_PubEncrypt functions with the CKM_RSA_PKCS_OAEP mechanism.
* New Intel AES assembly code for 32-bit and 64-bit Windows,
  contributed by Shay Gueron and Vlad Krasnov of Intel.
Notable Changes:
* The btoa command has a new command-line option -w suffix, which
  causes the output to be wrapped in BEGIN/END lines with the
  given suffix
* The certutil commands supports additionals types of subject
  alt name extensions.
* The certutil command supports generic certificate extensions,
  by loading binary data from files, which have been prepared using
  external tools, or which have been extracted from other existing
  certificates and dumped to file.
* The certutil command supports three new certificate usage specifiers.
* The pp command supports printing UTF-8 (-u).
* On Linux, NSS is built with the -ffunction-sections -fdata-sections
  compiler flags and the --gc-sections linker flag to allow unused
  functions to be discarded.
changes in 3.16.1
New functionality:
* Added the &amp;quot;ECC&amp;quot; flag for modutil to select the module used for
  elliptic curve cryptography (ECC) operations.
New Macros
* PUBLIC_MECH_ECC_FLAG
  a public mechanism flag for elliptic curve cryptography (ECC)
  operations
* SECMOD_ECC_FLAG
  an NSS-internal mechanism flag for elliptic curve cryptography
  (ECC) operations. This macro has the same numeric value as
  PUBLIC_MECH_ECC_FLAG.
Notable Changes:
* Imposed name constraints on the French government root CA ANSSI
  (DCISS).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009098967" comment="MozillaFirefox-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098968" comment="MozillaFirefox-branding-upstream-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098969" comment="MozillaFirefox-buildsymbols-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098970" comment="MozillaFirefox-devel-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098971" comment="MozillaFirefox-translations-common-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098972" comment="MozillaFirefox-translations-other-31.0-1.72.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098973" comment="libfreebl3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098974" comment="libfreebl3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098975" comment="libsoftokn3-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098976" comment="libsoftokn3-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098977" comment="mozilla-nss-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098978" comment="mozilla-nss-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098979" comment="mozilla-nss-certs-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098980" comment="mozilla-nss-certs-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098981" comment="mozilla-nss-devel-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098982" comment="mozilla-nss-sysinit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098983" comment="mozilla-nss-sysinit-32bit-3.16.3-1.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009098984" comment="mozilla-nss-tools-3.16.3-1.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:364" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird: Update to 24.7.0</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

MozillaThunderbird was updated to Thunderbird 24.7.0 (bnc#887746)
* MFSA 2014-56/CVE-2014-1547/CVE-2014-1548
  Miscellaneous memory safety hazards
* MFSA 2014-61/CVE-2014-1555 (bmo#1023121)
  Use-after-free with FireOnStateChange event
* MFSA 2014-62/CVE-2014-1556 (bmo#1028891)
  Exploitable WebGL crash with Cesium JavaScript library
* MFSA 2014-63/CVE-2014-1544 (bmo#963150)
  Use-after-free while when manipulating certificates in the trusted cache
  (solved with NSS 3.16.2 requirement)
* MFSA 2014-64/CVE-2014-1557 (bmo#913805)
  Crash in Skia library when scaling high quality images

A standalone enigmail 1.7 package that was previously built as part of
MozillaThunderbird was added.
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099259" comment="MozillaThunderbird-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099260" comment="MozillaThunderbird-buildsymbols-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099261" comment="MozillaThunderbird-devel-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099262" comment="MozillaThunderbird-translations-common-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099263" comment="MozillaThunderbird-translations-other-24.7.0-61.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099264" comment="enigmail-1.7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:365" version="1" class="patch">
	<metadata>
		<title>update for pulseaudio</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

	This update fixes the following security issue:
	(bnc#881524) CVE-2014-3970 - Denial of service in module-rtp-recv
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099114" comment="libpulse-devel-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099115" comment="libpulse-mainloop-glib0-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099116" comment="libpulse-mainloop-glib0-32bit-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099117" comment="libpulse0-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099118" comment="libpulse0-32bit-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099119" comment="pulseaudio-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099120" comment="pulseaudio-esound-compat-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099121" comment="pulseaudio-gdm-hooks-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099122" comment="pulseaudio-lang-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099123" comment="pulseaudio-module-bluetooth-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099124" comment="pulseaudio-module-gconf-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099125" comment="pulseaudio-module-jack-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099126" comment="pulseaudio-module-lirc-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099127" comment="pulseaudio-module-x11-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099128" comment="pulseaudio-module-zeroconf-3.0-1.10.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099129" comment="pulseaudio-utils-3.0-1.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:366" version="1" class="patch">
	<metadata>
		<title>update for exim</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Changes in exim:
- Silence static checkers; (beo#1506).

- update to 4.83
  This release of Exim includes one incompatible fix:
  + the behavior of expansion of arguments to math comparison functions
    (&amp;lt;, &amp;lt;=, =, =&amp;gt;, &amp;gt;) was unexpected, expanding the values twice;
    CVE-2014-2972; (bnc#888520)
  This release contains the following enhancements and bugfixes:
  + PRDR was promoted from Experimental to mainline
  + OCSP Stapling was promoted from Experimental to mainline
  + new Experimental feature Proxy Protocol
  + new Experimental feature DSN (Delivery Status Notifications)
  + TLS session improvements
  + TLS SNI fixes
  + LDAP enhancements
  + DMARC fixes (previous CVE-2014-2957) and new $dmarc_domain_policy
  + several new operations (listextract, utf8clean, md5, sha1)
  + enforce header formatting with verify=header_names_ascii
  + new commandline option -oMm
  + new TLSA dns lookup
  + new malware &amp;quot;sock&amp;quot; type
  + cutthrough routing enhancements
  + logging enhancements
  + DNSSEC enhancements
  + exiqgrep enhancements
  + deprecating non-standard SPF results
  + build and portability fixes
  + documentation fixes and enhancements
- Verify source tar ball gpg signature.
- Refresh exim-enable_ecdh_openssl.patch and strip version number from the
  patch filename.

- exim482-enable_ecdh_openssl.patch: Enable ECDH (elliptic curve diffie
  hellman) support, taken from http://bugs.exim.org/show_bug.cgi?id=1397

- BuildRequire libopenssl-devel only on SUSE systems.
- Fix suse_version condition of the pre- and postun scriptlets.

- Call service_add_pre from pre scriptlet on post-12.2 systems.

- update to 4.82
  - Add -bI: framework, and -bI:sieve for querying sieve capabilities.
  - Make -n do something, by making it not do something.
    When combined with -bP, the name of an option is not output.
  - Added tls_dh_min_bits SMTP transport driver option, only honoured
    by GnuTLS.
  - First step towards DNSSEC, provide $sender_host_dnssec for
    $sender_host_name and config options to manage this, and basic check
    routines.
  - DSCP support for outbound connections and control modifier for inbound.
  - Cyrus SASL: set local and remote IP;port properties for driver.
    (Only plugin which currently uses this is kerberos4, which nobody should
    be using, but we should make it available and other future plugins might
    conceivably use it, even though it would break NAT; stuff *should* be
    using channel bindings instead).
  - Handle &amp;quot;exim -L &amp;lt;tag&amp;gt;&amp;quot; to indicate to use syslog with tag as the process
    name; added for Sendmail compatibility; requires admin caller.
    Handle -G as equivalent to &amp;quot;control = suppress_local_fixups&amp;quot; (we used to
    just ignore it); requires trusted caller.
    Also parse but ignore: -Ac -Am -X&amp;lt;logfile&amp;gt;
    Bugzilla 1117.
  - Bugzilla 1258 - Refactor MAIL FROM optional args processing.
  - Add +smtp_confirmation as a default logging option.
  - Bugzilla 198 - Implement remove_header ACL modifier.
  - Bugzilla 1197, 1281, 1283 - Spec typo.
  - Bugzilla 1290 - Spec grammar fixes.
  - Bugzilla 1285 - Spec omission, fix docbook errors for spec.txt creation.
  - Add Experimental DMARC support using libopendmarc libraries.
  - Fix an out of order global option causing a segfault.  Reported to dev
    mailing list by by Dmitry Isaikin.
  - Bugzilla 1201 &amp;amp; 304 - New cutthrough-delivery feature, with TLS support.
  - Support &amp;quot;G&amp;quot; suffix to numbers in ${if comparisons.
  - Handle smtp transport tls_sni option forced-fail for OpenSSL.
  - Bugzilla 1196 - Spec examples corrections
  - Add expansion operators ${listnamed:name} and ${listcount:string}
  - Add gnutls_allow_auto_pkcs11 option (was originally called
    gnutls_enable_pkcs11, but renamed to more accurately indicate its
    function.
  - Let Linux makefile inherit CFLAGS/CFLAGS_DYNAMIC.
    Pulled from Debian 30_dontoverridecflags.dpatch by Andreas Metzler.
  - Add expansion item ${acl {name}{arg}...}, expansion condition
    &amp;quot;acl {{name}{arg}...}&amp;quot;, and optional args on acl condition
    &amp;quot;acl = name arg...&amp;quot;
  - Permit multiple router/transport headers_add/remove lines.
  - Add dnsdb pseudo-lookup &amp;quot;a+&amp;quot; to do an &amp;quot;aaaa&amp;quot; + &amp;quot;a&amp;quot; combination.
  - Avoid using a waiting database for a single-message-only transport.
    Performance patch from Paul Fisher.  Bugzilla 1262.
  - Strip leading/trailing newlines from add_header ACL modifier data.
    Bugzilla 884.
  - Add $headers_added variable, with content from use of ACL modifier
    add_header (but not yet added to the message).  Bugzilla 199.
  - Add 8bitmime log_selector, for 8bitmime status on the received line.
    Pulled from Bugzilla 817 by Wolfgang Breyha.
  - SECURITY: protect DKIM DNS decoding from remote exploit.
    CVE-2012-5671
    (nb: this is the same fix as in Exim 4.80.1)
  - Add A= logging on delivery lines, and a client_set_id option on
    authenticators.
  - Add optional authenticated_sender logging to A= and a log_selector
    for control.
  - Unbreak server_set_id for NTLM/SPA auth, broken by 4.80 PP/29.
  - Dovecot auth: log better reason to rejectlog if Dovecot did not
    advertise SMTP AUTH mechanism to us, instead of a generic
    protocol violation error.  Also, make Exim more robust to bad
    data from the Dovecot auth socket.
  - Fix ultimate retry timeouts for intermittently deliverable recipients.
  - When a queue runner is handling a message, Exim first routes the
    recipient addresses, during which it prunes them based on the retry
    hints database. After that it attempts to deliver the message to
    any remaining recipients. It then updates the hints database using
    the retry rules.
  - So if a recipient address works intermittently, it can get repeatedly
    deferred at routing time. The retry hints record remains fresh so the
    address never reaches the final cutoff time.
  - This is a fairly common occurrence when a user is bumping up against
    their storage quota. Exim had some logic in its local delivery code
    to deal with this. However it did not apply to per-recipient defers
    in remote deliveries, e.g. over LMTP to a separate IMAP message store.
  - This change adds a proper retry rule check during routing so that the
    final cutoff time is checked against the message's age. We only do
    this check if there is an address retry record and there is not a
    domain retry record; this implies that previous attempts to handle
    the address had the retry_use_local_parts option turned on. We use
    this as an approximation for the destination being like a local
    delivery, as in LMTP.
  - I suspect this new check makes the old local delivery cutoff check
    redundant, but I have not verified this so I left the code in place.
  - Correct gecos expansion when From: is a prefix of the username.
  - Test 0254 submits a message to Exim with the header
  	 Resent-From: f
  - When I ran the test suite under the user fanf2, Exim expanded
    the header to contain my full name, whereas it should have added
    a Resent-Sender: header. It erroneously treats any prefix of the
    username as equal to the username.
    This change corrects that bug.
  - DCC debug and logging tidyup
    Error conditions log to paniclog rather than rejectlog.
    Debug lines prefixed by &amp;quot;DCC: &amp;quot; to remove any ambiguity.
  - Avoid unnecessary rebuilds of lookup-related code.
  - Fix OCSP reinitialisation in SNI handling for Exim/TLS as server.
    Bug spotted by Jeremy Harris; was flawed since initial commit.
    Would have resulted in OCSP responses post-SNI triggering an Exim
    NULL dereference and crash.
  - Add $router_name and $transport_name variables.  Bugzilla 308.
  - Define SIOCGIFCONF_GIVES_ADDR for GNU Hurd.
    Bug detection, analysis and fix by Samuel Thibault.
    Bugzilla 1331, Debian bug #698092.
  - Update eximstats to watch out for senders sending 'HELO [IpAddr]'
  - SMTP PRDR (http://www.eric-a-hall.com/specs/draft-hall-prdr-00.txt).
    Server implementation by Todd Lyons, client by JH.
    Only enabled when compiled with EXPERIMENTAL_PRDR.  A new
    config variable &amp;quot;prdr_enable&amp;quot; controls whether the server
    advertises the facility.  If the client requests PRDR a new
    acl_data_smtp_prdr ACL is called once for each recipient, after
    the body content is received and before the acl_smtp_data ACL.
    The client is controlled by bolth of: a hosts_try_prdr option
    on the smtp transport, and the server advertisement.
    Default client logging of deliveries and rejections involving
    PRDR are flagged with the string &amp;quot;PRDR&amp;quot;.
  - Fix problems caused by timeouts during quit ACLs trying to double
    fclose().  Diagnosis by Todd Lyons.
    Update configure.default to handle IPv6 localhost better.
    Patch by Alain Williams (plus minor tweaks).
    Bugzilla 880.
  - OpenSSL made graceful with empty tls_verify_certificates setting.
    This is now consistent with GnuTLS, and is now documented: the
    previous undocumented portable approach to treating the option as
    unset was to force an expansion failure.  That still works, and
    an empty string is now equivalent.
  - Renamed DNSSEC-enabling option to &amp;quot;dns_dnssec_ok&amp;quot;, to make it
    clearer that Exim is using the DO (DNSSEC OK) EDNS0 resolver flag,
    not performing validation itself.
  - Added force_command boolean option to pipe transport.
    Patch from Nick Koston, of cPanel Inc.
  - AUTH support on callouts (and hence cutthrough-deliveries).
    Bugzilla 321, 823.
  - Added udpsend ACL modifer and hexquote expansion operator
  - Fix eximon continuous updating with timestamped log-files.
    Broken in a format-string cleanup in 4.80, missed when I repaired the
    other false fix of the same issue.
    Report and fix from Heiko Schlichting.
    Bugzilla 1363.
  - Guard LDAP TLS usage against Solaris LDAP variant.
    Report from Prashanth Katuri.
  - Support safari_ecdhe_ecdsa_bug for openssl_options.
    It's SecureTransport, so affects any MacOS clients which use the
    system-integrated TLS libraries, including email clients.
  - Fix segfault from trying to fprintf() to a NULL stdio FILE* if
    using a MIME ACL for non-SMTP local injection.
    Report and assistance in diagnosis by Warren Baker.
  - Adjust exiqgrep to be case-insensitive for sender/receiver.
  - Fix comparisons for 64b.  Bugzilla 1385.
  - Add expansion variable $authenticated_fail_id to keep track of
    last id that failed so it may be referenced in subsequent ACL's.
  - Bugzilla 1375 - Prevent TLS rebinding in ldap. Patch provided by
    Alexander Miroch.
  - Bugzilla 1382 - Option ldap_require_cert overrides start_tls
    ldap library initialization, allowing self-signed CA's to be
    used. Also properly sets require_cert option later in code by
    using NULL (global ldap config) instead of ldap handle (per
    session). Bug diagnosis and testing by alxgomz.
  - Enhanced documentation in the ratelimit.pl script provided in
    the src/util/ subdirectory.
  - Bug 1301 - Imported transport SQL logging patch from Axel Rau
    renamed to Transport Post Delivery Action by Jeremy Harris, as
    EXPERIMENTAL_TPDA.
  - Bugzilla 1217 - Redis lookup support has been added. It is only enabled
    when Exim is compiled with EXPERIMENTAL_REDIS. A new config variable
    redis_servers = needs to be configured which will be used by the redis
    lookup.  Patch from Warren Baker, of The Packet Hub.
  - Fix exiqsumm summary for corner case. Patch provided by Richard Hall.
  - Bugzilla 1289 - Clarify host/ip processing when have errors looking up a
    hostname or reverse DNS when processing a host list. Used suggestions
    from multiple comments on this bug.
  - Bugzilla 1057 - Multiple clamd TCP targets patch from Mark Zealey.
  - Had previously added a -CONTINUE option to runtest in the test suite.
    Missed a few lines, added it to make the runtest require no keyboard
    interaction.
  - Bugzilla 1402 - Test 533 fails if any part of the path to the test suite
    contains upper case chars. Make router use caseful_local_part.
  - Bugzilla 1400 - Add AVOID_GNUTLS_PKCS11 build option. Allows GnuTLS
    support when GnuTLS has been built with p11-kit.

- Add systemd support for openSUSE &amp;gt; 12.2
- Remove some obsolete conditionnal macros


- exim.spec forces the use of SSL libraries,
  so make sure the BuildRequires are there.
  Also add previously implicit cyrus-sasl back.


- Fixed another remote code execution issue (CVE-2011-1407 / bnc#694798)
- Fixed STARTTLS command injection (bnc#695144)		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099265" comment="exim-4.83-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099266" comment="eximon-4.83-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099267" comment="eximstats-html-4.83-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:367" version="1" class="patch">
	<metadata>
		<title>chromium: update to 36.0.1985.125</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Chromium was updated to version 36.0.1985.125.
New Functionality:
* Rich Notifications Improvements
* An Updated Incognito / Guest NTP design
* The addition of a Browser crash recovery bubble
* Chrome App Launcher for Linux
* Lots of under the hood changes for stability and performance
  
Security Fixes (bnc#887952,bnc#887955):
* CVE-2014-3160: Same-Origin-Policy bypass in SVG
* CVE-2014-3162: Various fixes from internal audits, fuzzing 
                 and other initiatives
and 24 more fixes for which no description was given.
 
Packaging changes:
* Switch to newer method to retrieve toolchain packages. Dropping
  the three naclsdk_*tgz files. Everything is now included in the
  toolchain_linux_x86.tar.bz2 tarball
* Add Courgette.tar.xz as that the build process now requires 
  some files from Courgette in order to build succesfully. This 
  does not mean that Courgette is build/delivered.

Includes also an update to Chromium 35.0.1916.153
Security fixes (bnc#882264,bnc#882264,bnc#882265,bnc#882263):
* CVE-2014-3154: Use-after-free in filesystem api
* CVE-2014-3155: Out-of-bounds read in SPDY
* CVE-2014-3156: Buffer overflow in clipboard
* CVE-2014-3157: Heap overflow in media
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099268" comment="chromedriver-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099269" comment="chromium-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099270" comment="chromium-desktop-gnome-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099271" comment="chromium-desktop-kde-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099272" comment="chromium-ffmpegsumo-36.0.1985.125-1.50.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099273" comment="chromium-suid-helper-36.0.1985.125-1.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:368" version="1" class="patch">
	<metadata>
		<title>security update for krb5</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
The following security isses are fixed in this update:

CVE-2014-4341 CVE-2014-4342: denial of service flaws when handling RFC 1964 tokens (bnc#886016)

CVE-2014-4343 CVE-2014-4344: multiple flaws in SPNEGO (bnc#888697)		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099274" comment="krb5-doc-1.10.2-10.26.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099275" comment="krb5-mini-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099276" comment="krb5-mini-devel-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099277" comment="krb5-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099278" comment="krb5-32bit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099279" comment="krb5-client-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099280" comment="krb5-devel-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099281" comment="krb5-devel-32bit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099282" comment="krb5-plugin-kdb-ldap-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099283" comment="krb5-plugin-preauth-pkinit-1.10.2-10.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099284" comment="krb5-server-1.10.2-10.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:369" version="1" class="patch">
	<metadata>
		<title>update for jbigkit</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

    The following security issue is fixed in this update
- [bnc#870855] - CVE-2013-6369: jbigkit buffer overflow 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099285" comment="jbigkit-2.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099286" comment="libjbig-devel-2.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099287" comment="libjbig-devel-32bit-2.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099288" comment="libjbig2-2.0-6.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099289" comment="libjbig2-32bit-2.0-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:370" version="1" class="patch">
	<metadata>
		<title>security update for elfutils</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
 Fix integer overflow in check_section (CVE-2014-0172, bnc#872785)		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099290" comment="elfutils-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099291" comment="libasm-devel-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099292" comment="libasm1-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099293" comment="libasm1-32bit-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099294" comment="libdw-devel-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099295" comment="libdw1-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099296" comment="libdw1-32bit-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099297" comment="libebl-devel-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099298" comment="libebl1-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099299" comment="libebl1-32bit-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099300" comment="libelf-devel-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099301" comment="libelf-devel-32bit-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099302" comment="libelf1-0.155-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099303" comment="libelf1-32bit-0.155-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:371" version="1" class="patch">
	<metadata>
		<title>update for tor</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- Tor 0.2.4.23 [bnc#889688] [CVE-2014-5117]
  Slows down the risk from guard rotation and backports several
  important fixes from the Tor 0.2.5 alpha release series.
- Major features:
  - Clients now look at the &amp;quot;usecreatefast&amp;quot; consensus parameter to
    decide whether to use CREATE_FAST or CREATE cells for the first hop
    of their circuit. This approach can improve security on connections
    where Tor's circuit handshake is stronger than the available TLS
    connection security levels, but the tradeoff is more computational
    load on guard relays.
  - Make the number of entry guards configurable via a new
    NumEntryGuards consensus parameter, and the number of directory
    guards configurable via a new NumDirectoryGuards consensus
    parameter.
- Major bugfixes:
  - Fix a bug in the bounds-checking in the 32-bit curve25519-donna
    implementation that caused incorrect results on 32-bit
    implementations when certain malformed inputs were used along with
    a small class of private ntor keys.
- Minor bugfixes:
  - Warn and drop the circuit if we receive an inbound 'relay early'
    cell.
  - Correct a confusing error message when trying to extend a circuit
    via the control protocol but we don't know a descriptor or
    microdescriptor for one of the specified relays.
  - Avoid an illegal read from stack when initializing the TLS module
    using a version of OpenSSL without all of the ciphers used by the
    v2 link handshake.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099304" comment="tor-0.2.4.23-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:372" version="1" class="patch">
	<metadata>
		<title>update for apache2-mod_security2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This is apache2-mod_security2 update fixes the following security issue:

- Specially drafted chunked http requests allow to bypass filters 
configured in mod_security2. This vulnerability is known as 
CVE-2013-5705 and was handled in bnc#871309.
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099588" comment="apache2-mod_security2-2.7.5-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:373" version="1" class="patch">
	<metadata>
		<title>update for apache2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This apache2 update fixes the following security issues:

- CRIME types of attack, based on size and timing analysis of compressed
  content, are now mitigated by the new SSLCompression directive, set to
  &amp;quot;no&amp;quot; in /etc/apache2/ssl-global.conf
- ssl-global.conf: SSLHonorCipherOrder set to on
- SSLCipherSuite updates to vhosts.d/vhost-ssl.template and 
  apache2-default-vhost-ssl.conf
- new config option CGIDScriptTimeout set to 60s in new file 
  conf.d/cgid-timeout.conf, preventing worker processes hanging forever 
  if a cgi launched from them has stopped reading input from the server.
  (bnc#887768, CVE-2014-0231)
- fix for mod_status race condition in scoreboard handling and 
  consecutive heap overflow and information disclosure if access to 
  mod_status is granted to a potential attacker. (bnc#887765, 
  CVE-2014-0226)
- fixed improperly handled whitespace characters in CDATA sections of 
  requests to mod_dav can lead to a crash, resulting in a DoS against 
  the server. (bnc#869105, CVE-2013-6438)
- fix for crash in parsing cookie content, resulting in a DoS against 
  the server. (bnc#869106, CVE-2014-0098)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099589" comment="apache2-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099590" comment="apache2-devel-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099591" comment="apache2-doc-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099592" comment="apache2-event-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099593" comment="apache2-example-pages-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099594" comment="apache2-itk-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099595" comment="apache2-prefork-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099596" comment="apache2-utils-2.2.22-10.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099597" comment="apache2-worker-2.2.22-10.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:374" version="1" class="patch">
	<metadata>
		<title>update for python</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This python update fixes the following security and non security issues:

- CGIHTTPServer file disclosure and directory traversal through 
  URL-encoded characters (CVE-2014-4650, bnc#885882)
- remove link count optimizations that are incorrect on btrfs (and 
  possibly other filesystems) 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099598" comment="libpython2_7-1_0-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099599" comment="libpython2_7-1_0-32bit-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099600" comment="python-base-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099601" comment="python-base-32bit-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099602" comment="python-devel-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099603" comment="python-xml-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099604" comment="python-doc-2.7-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099605" comment="python-doc-pdf-2.7-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099606" comment="python-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099607" comment="python-32bit-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099608" comment="python-curses-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099609" comment="python-demo-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099610" comment="python-gdbm-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099611" comment="python-idle-2.7.3-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099612" comment="python-tk-2.7.3-10.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:375" version="1" class="patch">
	<metadata>
		<title>update for python3</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This python3 update fixes the following security and non security issues:

- CGIHTTPServer filedisclosure and directory traversal through 
  URL-encoded characters (CVE-2014-4650, bnc#885882)
- DoS on ssl.match_hostname via a crafted certificate with too many 
  wildcards (CVE-2013-2099, bnc#886001)
- fix import_failed hook file names
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099893" comment="libpython3_3m1_0-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099894" comment="libpython3_3m1_0-32bit-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099895" comment="python3-base-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099896" comment="python3-base-32bit-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099897" comment="python3-devel-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099898" comment="python3-idle-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099899" comment="python3-testsuite-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099900" comment="python3-tools-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099901" comment="python3-doc-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099902" comment="python3-doc-pdf-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099903" comment="python3-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099904" comment="python3-32bit-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099905" comment="python3-curses-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099906" comment="python3-dbm-3.3.0-6.23.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099907" comment="python3-tk-3.3.0-6.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:376" version="1" class="patch">
	<metadata>
		<title>update for gpgme</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This gpgme update to version 1.4.4 fixes the following security and non i
security issues:

- Fixed possible overflow in gpgsm and uiserver engines.
    (CVE-2014-3564, bnc#890123)
- Fixed possibled segv in gpgme_op_card_edit.
- Fixed minor memleaks and possible zombie processes.
- Fixed prototype inconsistencies and void pointer arithmetic.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099613" comment="gpgme-1.3.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099614" comment="libgpgme-devel-1.3.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099615" comment="libgpgme11-1.3.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099616" comment="libgpgme11-32bit-1.3.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:377" version="1" class="patch">
	<metadata>
		<title>update for krb5, krb5-doc, krb5-mini</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Thit MIT krb5 update fixes the following security issue:

- buffer overrun in kadmind with LDAP backend (bnc#891082, CVE-2014-4345)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099617" comment="krb5-doc-1.10.2-10.30.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099618" comment="krb5-mini-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099619" comment="krb5-mini-devel-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099620" comment="krb5-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099621" comment="krb5-32bit-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099622" comment="krb5-client-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099623" comment="krb5-devel-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099624" comment="krb5-devel-32bit-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099625" comment="krb5-plugin-kdb-ldap-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099626" comment="krb5-plugin-preauth-pkinit-1.10.2-10.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099627" comment="krb5-server-1.10.2-10.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:378" version="1" class="patch">
	<metadata>
		<title>update for openssl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This openssl update fixes the following security issues:

- openssl 1.0.1i
* Information leak in pretty printing functions (CVE-2014-3508)
* Crash with SRP ciphersuite in Server Hello message (CVE-2014-5139)
* Race condition in ssl_parse_serverhello_tlsext (CVE-2014-3509)
* Double Free when processing DTLS packets (CVE-2014-3505)
* DTLS memory exhaustion (CVE-2014-3506)
* DTLS memory leak from zero-length fragments (CVE-2014-3507)
* OpenSSL DTLS anonymous EC(DH) denial of service (CVE-2014-3510)
* OpenSSL TLS protocol downgrade attack (CVE-2014-3511)
* SRP buffer overrun (CVE-2014-3512)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099804" comment="libopenssl-devel-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099805" comment="libopenssl-devel-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099806" comment="libopenssl1_0_0-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099807" comment="libopenssl1_0_0-32bit-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099808" comment="openssl-1.0.1i-1.64.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099809" comment="openssl-doc-1.0.1i-1.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:379" version="1" class="patch">
	<metadata>
		<title>update for libserf, subversion</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This subversion and libserf update fixes several security and 
non security issues:

- subversion: guard against md5 hash collisions when finding cached 
  credentials [bnc#889849] [CVE-2014-3528]
- subversion: ra_serf: properly match wildcards in SSL certs. 
  [bnc#890511] [CVE-2014-3522]
- libserf: Handle NUL bytes in fields of an X.509 certificate.
  [bnc#890510] [CVE-2014-3504]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099851" comment="libserf-1-0-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099852" comment="libserf-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099853" comment="libserf-devel-1.1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099854" comment="libsvn_auth_gnome_keyring-1-0-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099855" comment="libsvn_auth_kwallet-1-0-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099856" comment="subversion-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099857" comment="subversion-bash-completion-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099858" comment="subversion-devel-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099859" comment="subversion-perl-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099860" comment="subversion-python-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099861" comment="subversion-server-1.7.18-2.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099862" comment="subversion-tools-1.7.18-2.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:380" version="1" class="patch">
	<metadata>
		<title>update for IPython</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This IPython update fixes the following security issue:

- RCE in IPython Notebook via cross-origin websocket connection
  (CVE-2014-3429, bnc#887577)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099863" comment="IPython-0.13.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099864" comment="IPython-doc-0.13.1-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099865" comment="python3-IPython-0.13.1-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:381" version="1" class="patch">
	<metadata>
		<title>libgcrypt: Remediation for side-channel attack on Elgamal encryption subkeys</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
libgcrypt was updated to 1.5.4 to prevent a side-channel attack on Elgamal encryption subkeys.

Besides that the following issues were resolved:
	  
- Improved performance of RSA, DSA, and Elgamal by using a new exponentiation algorithm.
- Fixed a subtle bug in mpi_set_bit which could set spurious bits.
- Fixed a bug in an internal division function.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099866" comment="libgcrypt-1.5.4-12.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099867" comment="libgcrypt-devel-1.5.4-12.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099868" comment="libgcrypt-devel-32bit-1.5.4-12.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099869" comment="libgcrypt11-1.5.4-12.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099870" comment="libgcrypt11-32bit-1.5.4-12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:382" version="1" class="patch">
	<metadata>
		<title>update for phpMyAdmin</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This phpMyAdmin update addresses several security and non security 
issues:

- This is a phpMyAdmin version upgrade (bnc#892401):
  (From 4.1.14.3):
  * sf#4501 [security] XSS in table browse page (CVE-2014-5273)
  * sf#4502 [security] Self-XSS in enum value editor (CVE-2014-5273)
  * sf#4503 [security] Self-XSSes in monitor (CVE-2014-5273)
  * sf#4505 [security] XSS in view operations page (CVE-2014-5274)
  * sf#4504 [security] Self-XSS in query charts	(CVE-2014-5273)
  * sf#4517 [security] XSS in relation view (CVE-2014-5273)
  (From 4.1.14.2):
  * sf#4488 [security] XSS injection due to unescaped table name 
    (triggers)(CVE-2014-4955)
  * sf#4492 [security] XSS in AJAX confirmation messages (CVE-2014-4986)
  * sf#4491 [security] Missing validation for accessing User groups 
    feature (CVE-2014-4987)
  (From 4.1.14.1):
  * sf#4464 [security] XSS injection due to unescaped db/table name in 
    navigation hiding (CVE-2014-4349)
  (From 4.1.14.0 through 4.1.9.0):
  * Numerous non-security bugfixes are listed at
    https://github.com/phpmyadmin/phpmyadmin/blob/MAINT_4_1_14/ChangeLog
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099908" comment="phpMyAdmin-4.1.14.3-1.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:383" version="1" class="patch">
	<metadata>
		<title>glibc: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

glibc was updated to fix three security issues:

- A directory traversal in locale environment handling was fixed
 (CVE-2014-0475, bnc#887022, GLIBC BZ #17137)

- Disable gconv transliteration module loading which could be used for
  code execution (CVE-2014-5119, bnc#892073, GLIBC BZ #17187)

- Fix crashes on invalid input in IBM gconv modules (CVE-2014-6040,
  bnc#894553, BZ #17325)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100031" comment="glibc-testsuite-2.17-4.13.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100032" comment="glibc-utils-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100033" comment="glibc-utils-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100034" comment="glibc-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100035" comment="glibc-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100036" comment="glibc-devel-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100037" comment="glibc-devel-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100038" comment="glibc-devel-static-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100039" comment="glibc-devel-static-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100040" comment="glibc-extra-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100041" comment="glibc-i18ndata-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100042" comment="glibc-info-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100043" comment="glibc-locale-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100044" comment="glibc-locale-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100045" comment="glibc-obsolete-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100046" comment="glibc-profile-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100047" comment="glibc-profile-32bit-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100048" comment="nscd-2.17-4.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100049" comment="glibc-html-2.17-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:384" version="1" class="patch">
	<metadata>
		<title>enigmail: security fix</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

enigmail was updated to version 1.7.2 (bnc#893330)
* bugfix release which contains several bugfixes including
  mail with only Bcc recipients sent in plain text (CVE-2014-5369)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099943" comment="enigmail-1.7.2-6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:385" version="1" class="patch">
	<metadata>
		<title>LibreOffice: two security fixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes memory corruption vulnerability in DOCM import and data exposure using crafted OLE objects.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100165" comment="libreoffice-branding-upstream-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100166" comment="libreoffice-help-en-US-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100167" comment="libreoffice-help-ast-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100168" comment="libreoffice-help-bg-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100169" comment="libreoffice-help-ca-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100170" comment="libreoffice-help-cs-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100171" comment="libreoffice-help-da-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100172" comment="libreoffice-help-de-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100173" comment="libreoffice-help-en-GB-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100174" comment="libreoffice-help-group1-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100175" comment="libreoffice-help-el-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100176" comment="libreoffice-help-en-ZA-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100177" comment="libreoffice-help-es-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100178" comment="libreoffice-help-et-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100179" comment="libreoffice-help-eu-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100180" comment="libreoffice-help-fi-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100181" comment="libreoffice-help-fr-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100182" comment="libreoffice-help-group2-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100183" comment="libreoffice-help-gl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100184" comment="libreoffice-help-group3-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100185" comment="libreoffice-help-gu-IN-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100186" comment="libreoffice-help-hi-IN-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100187" comment="libreoffice-help-hu-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100188" comment="libreoffice-help-it-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100189" comment="libreoffice-help-ja-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100190" comment="libreoffice-help-km-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100191" comment="libreoffice-help-group4-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100192" comment="libreoffice-help-ko-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100193" comment="libreoffice-help-mk-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100194" comment="libreoffice-help-nb-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100195" comment="libreoffice-help-nl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100196" comment="libreoffice-help-pl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100197" comment="libreoffice-help-pt-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100198" comment="libreoffice-help-pt-BR-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100199" comment="libreoffice-help-group5-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100200" comment="libreoffice-help-ru-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100201" comment="libreoffice-help-sk-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100202" comment="libreoffice-help-sl-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100203" comment="libreoffice-help-sv-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100204" comment="libreoffice-help-tr-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100205" comment="libreoffice-help-vi-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100206" comment="libreoffice-help-zh-CN-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100207" comment="libreoffice-help-zh-TW-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100208" comment="libreoffice-icon-theme-crystal-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100209" comment="libreoffice-icon-theme-galaxy-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100210" comment="libreoffice-icon-theme-hicontrast-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100211" comment="libreoffice-icon-theme-oxygen-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100212" comment="libreoffice-icon-theme-tango-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100213" comment="libreoffice-icon-themes-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100214" comment="libreoffice-l10n-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100215" comment="libreoffice-l10n-af-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100216" comment="libreoffice-l10n-am-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100217" comment="libreoffice-l10n-ar-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100218" comment="libreoffice-l10n-as-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100219" comment="libreoffice-l10n-ast-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100220" comment="libreoffice-l10n-be-BY-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100221" comment="libreoffice-l10n-bg-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100222" comment="libreoffice-l10n-br-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100223" comment="libreoffice-l10n-ca-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100224" comment="libreoffice-l10n-cs-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100225" comment="libreoffice-l10n-cy-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100226" comment="libreoffice-l10n-da-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100227" comment="libreoffice-l10n-de-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100228" comment="libreoffice-l10n-el-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100229" comment="libreoffice-l10n-en-GB-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100230" comment="libreoffice-l10n-en-ZA-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100231" comment="libreoffice-l10n-eo-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100232" comment="libreoffice-l10n-es-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100233" comment="libreoffice-l10n-et-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100234" comment="libreoffice-l10n-eu-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100235" comment="libreoffice-l10n-fi-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100236" comment="libreoffice-l10n-fr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100237" comment="libreoffice-l10n-ga-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100238" comment="libreoffice-l10n-gd-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100239" comment="libreoffice-l10n-gl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100240" comment="libreoffice-l10n-gu-IN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100241" comment="libreoffice-l10n-he-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100242" comment="libreoffice-l10n-hi-IN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100243" comment="libreoffice-l10n-hr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100244" comment="libreoffice-l10n-hu-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100245" comment="libreoffice-l10n-id-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100246" comment="libreoffice-l10n-is-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100247" comment="libreoffice-l10n-it-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100248" comment="libreoffice-l10n-ja-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100249" comment="libreoffice-l10n-ka-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100250" comment="libreoffice-l10n-km-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100251" comment="libreoffice-l10n-kn-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100252" comment="libreoffice-l10n-ko-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100253" comment="libreoffice-l10n-lt-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100254" comment="libreoffice-l10n-mk-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100255" comment="libreoffice-l10n-ml-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100256" comment="libreoffice-l10n-mr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100257" comment="libreoffice-l10n-nb-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100258" comment="libreoffice-l10n-nl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100259" comment="libreoffice-l10n-nn-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100260" comment="libreoffice-l10n-nr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100261" comment="libreoffice-l10n-om-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100262" comment="libreoffice-l10n-or-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100263" comment="libreoffice-l10n-pa-IN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100264" comment="libreoffice-l10n-pl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100265" comment="libreoffice-l10n-pt-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100266" comment="libreoffice-l10n-pt-BR-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100267" comment="libreoffice-l10n-ro-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100268" comment="libreoffice-l10n-ru-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100269" comment="libreoffice-l10n-rw-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100270" comment="libreoffice-l10n-sh-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100271" comment="libreoffice-l10n-sk-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100272" comment="libreoffice-l10n-sl-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100273" comment="libreoffice-l10n-sr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100274" comment="libreoffice-l10n-ss-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100275" comment="libreoffice-l10n-st-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100276" comment="libreoffice-l10n-sv-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100277" comment="libreoffice-l10n-ta-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100278" comment="libreoffice-l10n-te-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100279" comment="libreoffice-l10n-tg-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100280" comment="libreoffice-l10n-th-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100281" comment="libreoffice-l10n-tr-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100282" comment="libreoffice-l10n-ts-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100283" comment="libreoffice-l10n-ug-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100284" comment="libreoffice-l10n-uk-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100285" comment="libreoffice-l10n-ve-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100286" comment="libreoffice-l10n-vi-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100287" comment="libreoffice-l10n-xh-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100288" comment="libreoffice-l10n-zh-CN-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100289" comment="libreoffice-l10n-zh-TW-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100290" comment="libreoffice-l10n-zu-3.6.3.2.4-2.9.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100291" comment="libreoffice-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100292" comment="libreoffice-base-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100293" comment="libreoffice-base-drivers-mysql-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100294" comment="libreoffice-base-drivers-postgresql-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100295" comment="libreoffice-base-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100296" comment="libreoffice-calc-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100297" comment="libreoffice-calc-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100298" comment="libreoffice-draw-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100299" comment="libreoffice-draw-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100300" comment="libreoffice-filters-optional-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100301" comment="libreoffice-gnome-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100302" comment="libreoffice-icon-themes-prebuilt-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100303" comment="libreoffice-impress-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100304" comment="libreoffice-impress-extensions-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100305" comment="libreoffice-kde-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100306" comment="libreoffice-kde4-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100307" comment="libreoffice-l10n-prebuilt-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100308" comment="libreoffice-mailmerge-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100309" comment="libreoffice-math-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100310" comment="libreoffice-officebean-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100311" comment="libreoffice-pyuno-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100312" comment="libreoffice-sdk-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100313" comment="libreoffice-sdk-doc-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100314" comment="libreoffice-writer-3.6.3.2.4-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100315" comment="libreoffice-writer-extensions-3.6.3.2.4-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:386" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox: Security update to Firefox 32</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Mozilla Firefox was updated to Firefox 32 fixing security issues and bugs.

Security issues fixed:
MFSA 2014-72 / CVE-2014-1567: Security researcher regenrecht reported, via
TippingPoint's Zero Day Initiative, a use-after-free during text layout when
interacting with the setting of text direction. This results in a
use-after-free which can lead to arbitrary code execution.

MFSA 2014-70 / CVE-2014-1565: Security researcher Holger Fuhrmannek discovered
an out-of-bounds read during the creation of an audio timeline in Web Audio.
This results in a crash and could allow for the reading of random memory
values.

MFSA 2014-69 / CVE-2014-1564: Google security researcher Michal Zalewski
discovered that when a malformated GIF image is rendered in certain
circumstances, memory is not properly initialized before use. The resulting
image then uses this memory during rendering. This could allow for the a script
in web content to access this unitialized memory using the &amp;lt;canvas&amp;gt; feature.

MFSA 2014-68 / CVE-2014-1563: Security researcher Abhishek Arya (Inferno) of
the Google Chrome Security Team used the Address Sanitizer tool to discover a
use-after-free during cycle collection. This was found in interactions with the
SVG content through the document object model (DOM) with animating SVG content.
This leads to a potentially exploitable crash.

MFSA 2014-67: Mozilla developers and community identified and fixed several
memory safety bugs in the browser engine used in Firefox and other
Mozilla-based products. Some of these bugs showed evidence of memory corruption
under certain circumstances, and we presume that with enough effort at least
some of these could be exploited to run arbitrary code.

Jan de Mooij reported a memory safety problem that affects Firefox ESR 24.7,
ESR 31 and Firefox 31. (CVE-2014-1562)

Christian Holler, Jan de Mooij, Karl Tomlinson, Randell Jesup, Gary Kwong,
Jesse Ruderman, and JW Wang reported memory safety problems and crashes that
affect Firefox ESR 31 and Firefox 31. (CVE-2014-1553)

Gary Kwong, Christian Holler, and David Weir reported memory safety problems
and crashes that affect Firefox 31. (CVE-2014-1554)


Mozilla NSS was updated to 3.16.4:
Notable Changes:
* The following 1024-bit root CA certificate was restored to allow more
  time to develop a better transition strategy for affected sites. It was
  removed in NSS 3.16.3, but discussion in the mozilla.dev.security.policy
  forum led to the decision to keep this root included longer in order to
  give website administrators more time to update their web servers.
    - CN = GTE CyberTrust Global Root
* In NSS 3.16.3, the 1024-bit &amp;quot;Entrust.net Secure Server Certification
  Authority&amp;quot; root CA certificate was removed. In NSS 3.16.4, a 2048-bit
  intermediate CA certificate has been included, without explicit trust.
  The intention is to mitigate the effects of the previous removal of the
  1024-bit Entrust.net root certificate, because many public Internet
  sites still use the &amp;quot;USERTrust Legacy Secure Server CA&amp;quot; intermediate
  certificate that is signed by the 1024-bit Entrust.net root certificate.
  The inclusion of the intermediate certificate is a temporary measure to
  allow those sites to function, by allowing them to find a trust path to
  another 2048-bit root CA certificate. The temporarily included
  intermediate certificate expires November 1, 2015.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099944" comment="MozillaFirefox-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099945" comment="MozillaFirefox-branding-upstream-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099946" comment="MozillaFirefox-buildsymbols-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099947" comment="MozillaFirefox-devel-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099948" comment="MozillaFirefox-translations-common-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099949" comment="MozillaFirefox-translations-other-31.1.0-1.86.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099950" comment="libfreebl3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099951" comment="libfreebl3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099952" comment="libsoftokn3-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099953" comment="libsoftokn3-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099954" comment="mozilla-nss-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099955" comment="mozilla-nss-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099956" comment="mozilla-nss-certs-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099957" comment="mozilla-nss-certs-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099958" comment="mozilla-nss-devel-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099959" comment="mozilla-nss-sysinit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099960" comment="mozilla-nss-sysinit-32bit-3.16.4-1.51.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099961" comment="mozilla-nss-tools-3.16.4-1.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:387" version="1" class="patch">
	<metadata>
		<title>net-snmp: fix for remote denial of service issue</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
net-snmp was updated to fix a remote denial of service problem inside snmptrapd when started 
  with the &amp;quot;-OQ&amp;quot; option (CVE-2014-3565)(bnc#894361)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100016" comment="libsnmp30-32bit-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100017" comment="libsnmp30-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100018" comment="net-snmp-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100019" comment="net-snmp-devel-32bit-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100020" comment="net-snmp-devel-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100021" comment="perl-SNMP-5.7.2-3.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100022" comment="snmp-mibs-5.7.2-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:388" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird: Update to 31.1 release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

MozillaThunderbird was updated to Thunderbird 31.1.0 (bnc#894370), fixinfg security issues:
  * MFSA 2014-67/CVE-2014-1553/CVE-2014-1562
    Miscellaneous memory safety hazards
  * MFSA 2014-68/CVE-2014-1563 (bmo#1018524)
    Use-after-free during DOM interactions with SVG
  * MFSA 2014-69/CVE-2014-1564 (bmo#1045977)
    Uninitialized memory use during GIF rendering
  * MFSA 2014-70/CVE-2014-1565 (bmo#1047831)
    Out-of-bounds read in Web Audio audio timeline
  * MFSA 2014-72/CVE-2014-1567 (bmo#1037641)
    Use-after-free setting text directionality

- update to Thunderbird 31.0
  * based on Gecko 31
  * Autocompleting email addresses now matches against any part of
    the name or email
  * Composing a mail to a newsgroup will now autocomplete newsgroup
    names
  * Insecure NTLM (pre-NTLMv2) authentication disabled
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009099962" comment="MozillaThunderbird-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099963" comment="MozillaThunderbird-buildsymbols-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099964" comment="MozillaThunderbird-devel-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099965" comment="MozillaThunderbird-translations-common-31.1.0-61.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009099966" comment="MozillaThunderbird-translations-other-31.1.0-61.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:389" version="1" class="patch">
	<metadata>
		<title>chromium: security update to 37.0.2062.94</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Chromium was updated to 37.0.2062.94 containing security Fixes (bnc#893720).

A full list of changes is available in the log:

https://chromium.googlesource.com/chromium/src/+log/36.0.1985.0..37.0.2062.0?pretty=full

This update includes 50 security fixes. Below, we highlight fixes that were
either contributed by external researchers or particularly interesting. Please
see the Chromium security page for more information.

Critical CVE-2014-3176, CVE-2014-3177: A special reward to lokihardt@asrt for a
combination of bugs in V8, IPC, sync, and extensions that can lead to remote
code execution outside of the sandbox.

High CVE-2014-3168: Use-after-free in SVG. Credit to cloudfuzzer.
High CVE-2014-3169: Use-after-free in DOM. Credit to Andrzej Dyjak.
High CVE-2014-3170: Extension permission dialog spoofing. Credit to Rob Wu.
High CVE-2014-3171: Use-after-free in bindings. Credit to cloudfuzzer.
Medium CVE-2014-3172: Issue related to extension debugging. Credit to Eli Grey.
Medium CVE-2014-3173: Uninitialized memory read in WebGL. Credit to jmuizelaar.
Medium CVE-2014-3174: Uninitialized memory read in Web Audio. Credit to Atte
Kettunen from OUSPG.

We would also like to thank Collin Payne, Christoph Diehl, Sebastian Mauer,
Atte Kettunen, and cloudfuzzer for working with us during the development cycle
to prevent security bugs from ever reaching the stable channel. $8000 in
additional rewards were issued.

As usual, our ongoing internal security work responsible for a wide range of
fixes:
CVE-2014-3175: Various fixes from internal audits, fuzzing and other
initiatives (Chrome 37).

Many of the above bugs were detected using AddressSanitizer.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100734" comment="chromedriver-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100735" comment="chromium-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100736" comment="chromium-desktop-gnome-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100737" comment="chromium-desktop-kde-37.0.2062.94-1.55.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100738" comment="chromium-ffmpegsumo-37.0.2062.94-1.55.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:390" version="1" class="patch">
	<metadata>
		<title>procmail: fixed a heap overflow in formail</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
procmail was updated to fix a heap-overflow in procmail's formail utility when processing specially-crafted email headers (bnc#894999, CVE-2014-3618)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100050" comment="procmail-3.22-260.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:391" version="1" class="patch">
	<metadata>
		<title>squid: security and bugfixes</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This update fixes the following security issues and bugs with squid:

A denial of Service in Range header processing was fixed that could be used
by proxy users to crash squid. (CVE-2014-3609)

Also the following bugs were fixed:
- bnc#894840: removed unnecessary 'sharedscripts' in squid's logrotate snippet
- bnc#894636: fixes run of init script when logrotate is called
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100680" comment="squid-3.2.11-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:392" version="1" class="patch">
	<metadata>
		<title>python-django: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Python Django was updated to fix security issues and bugs.

Update to version 1.4.15 on openSUSE 12.3:
+ Prevented reverse() from generating URLs pointing to other hosts
  to prevent phishing attacks (bnc#893087, CVE-2014-0480)
+ Removed O(n) algorithm when uploading duplicate file names
  to fix file upload denial of service (bnc#893088, CVE-2014-0481)
+ Modified RemoteUserMiddleware to logout on REMOTE_USE change
  to prevent session hijacking (bnc#893089, CVE-2014-0482)
+ Prevented data leakage in contrib.admin via query string manipulation
  (bnc#893090, CVE-2014-0483)
+ Fixed: Caches may incorrectly be allowed to store and serve private data
  (bnc#877993, CVE-2014-1418)
+ Fixed: Malformed redirect URLs from user input not correctly validated
  (bnc#878641, CVE-2014-3730)
+ Fixed queries that may return unexpected results on MySQL
  due to typecasting (bnc#874956, CVE-2014-0474)
+ Prevented leaking the CSRF token through caching
  (bnc#874955, CVE-2014-0473)
+ Fixed a remote code execution vulnerabilty in URL reversing
  (bnc#874950, CVE-2014-0472)

Update to version 1.5.10 on openSUSE 13.1:
+ Prevented reverse() from generating URLs pointing to other hosts
  to prevent phishing attacks (bnc#893087, CVE-2014-0480)
+ Removed O(n) algorithm when uploading duplicate file names
  to fix file upload denial of service (bnc#893088, CVE-2014-0481)
+ Modified RemoteUserMiddleware to logout on REMOTE_USE change
  to prevent session hijacking (bnc#893089, CVE-2014-0482)
+ Prevented data leakage in contrib.admin via query string manipulation
  (bnc#893090, CVE-2014-0483)

- Update to version 1.5.8:
+ Fixed: Caches may incorrectly be allowed to store and serve private data
  (bnc#877993, CVE-2014-1418)
+ Fixed: Malformed redirect URLs from user input not correctly validated
  (bnc#878641, CVE-2014-3730)
+ Fixed queries that may return unexpected results on MySQL
  due to typecasting (bnc#874956, CVE-2014-0474)
+ Prevented leaking the CSRF token through caching
  (bnc#874955, CVE-2014-0473)
+ Fixed a remote code execution vulnerabilty in URL reversing
  (bnc#874950, CVE-2014-0472)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100467" comment="python-django-1.4.15-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:393" version="1" class="patch">
	<metadata>
		<title>ppp: fixed integer overflow in option parsing</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
ppp was updated to fix an integer overflow in option parsing. (CVE-2014-3158, bnc#891489).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100468" comment="ppp-2.4.5-15.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100469" comment="ppp-devel-2.4.5-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:394" version="1" class="patch">
	<metadata>
		<title>php5: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

php5 was updated to fix three security issues:

- Insecure temporary file use for cache data was fixed by switching to a different root only directory /var/cache/php-pear (CVE-2014-5459)
- An incomplete fix for CVE-2014-4049 (CVE-2014-3597) 
- gd extension: NUL byte injection in filenames passed to image handling functions was fixed (CVE-2014-5120)

Also a bug was fixed:
- fixed suhosin crash if used with php session_set_save_handler() 
  [bnc#895658]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100470" comment="apache2-mod_php5-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100471" comment="php5-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100472" comment="php5-bcmath-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100473" comment="php5-bz2-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100474" comment="php5-calendar-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100475" comment="php5-ctype-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100476" comment="php5-curl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100477" comment="php5-dba-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100478" comment="php5-devel-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100479" comment="php5-dom-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100480" comment="php5-enchant-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100481" comment="php5-exif-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100482" comment="php5-fastcgi-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100483" comment="php5-fileinfo-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100484" comment="php5-fpm-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100485" comment="php5-ftp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100486" comment="php5-gd-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100487" comment="php5-gettext-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100488" comment="php5-gmp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100489" comment="php5-iconv-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100490" comment="php5-imap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100491" comment="php5-intl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100492" comment="php5-json-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100493" comment="php5-ldap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100494" comment="php5-mbstring-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100495" comment="php5-mcrypt-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100496" comment="php5-mssql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100497" comment="php5-mysql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100498" comment="php5-odbc-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100499" comment="php5-openssl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100500" comment="php5-pcntl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100501" comment="php5-pdo-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100502" comment="php5-pear-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100503" comment="php5-pgsql-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100504" comment="php5-phar-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100505" comment="php5-posix-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100506" comment="php5-pspell-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100507" comment="php5-readline-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100508" comment="php5-shmop-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100509" comment="php5-snmp-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100510" comment="php5-soap-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100511" comment="php5-sockets-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100512" comment="php5-sqlite-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100513" comment="php5-suhosin-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100514" comment="php5-sysvmsg-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100515" comment="php5-sysvsem-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100516" comment="php5-sysvshm-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100517" comment="php5-tidy-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100518" comment="php5-tokenizer-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100519" comment="php5-wddx-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100520" comment="php5-xmlreader-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100521" comment="php5-xmlrpc-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100522" comment="php5-xmlwriter-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100523" comment="php5-xsl-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100524" comment="php5-zip-5.3.17-3.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100525" comment="php5-zlib-5.3.17-3.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:395" version="1" class="patch">
	<metadata>
		<title>curl: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

libcurl was updated to fix security issues:

CVE-2014-3613: Cookies for hosts specified by numeric IP could be assigned or used for other numeric IP hosts
if portions of the numerics were the same.

CVE-2014-3620: libcurl allowed cookies to be set for toplevel domains, making them to broad.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100587" comment="curl-7.28.1-4.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100588" comment="libcurl-devel-7.28.1-4.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100589" comment="libcurl4-32bit-7.28.1-4.43.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100590" comment="libcurl4-7.28.1-4.43.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:396" version="1" class="patch">
	<metadata>
		<title>lua: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
lua was updated to fix an overflow in varargs functions (CVE-2014-5461 ,bnc#893824)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100681" comment="liblua5_2-32bit-5.2.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100682" comment="liblua5_2-5.2.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100683" comment="lua-5.2.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100684" comment="lua-devel-5.2.1-2.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100685" comment="lua-doc-5.2.1-2.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:397" version="1" class="patch">
	<metadata>
		<title>phpMyAdmin: security update to 4.1.14.4</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

phpMyAdmin was updated to 4.1.14.4 (2014-09-13) fixing bugs and security issues.

* PMASA-2014-10 (CVE-2014-6300, CWE-661 CWE-352)
  http://www.phpmyadmin.net/home_page/security/PMASA-2014-10.php

  A DOM based XSS was fixed that resulted to a CSRF
  that creates a ROOT account in certain conditions.

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100739" comment="phpMyAdmin-4.1.14.4-1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:398" version="1" class="patch">
	<metadata>
		<title>dbus-1: update to 1.6.24</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The DBUS-1 service and libraries were updated to upstream release 1.6.24 fixing 
security issues and bugs.

Upstream changes since dbus 1.6.8
  + Security fixes
    - Do not accept an extra fd in the padding of a cmsg message, which
      could lead to a 4-byte heap buffer overrun. (CVE-2014-3635,
      fdo#83622; Simon McVittie)
    - Reduce default for maximum Unix file descriptors passed per
      message from 1024 to 16, preventing a uid with the default maximum
      number of connections from exhausting the system bus' file
      descriptors under Linux's default rlimit. Distributors or system
      administrators with a more restrictive fd limit may wish to reduce
      these limits further.
      Additionally, on Linux this prevents a second denial of service in
      which the dbus-daemon can be made to exceed the maximum number of
      fds per sendmsg() and disconnect the process that would have
      received them. (CVE-2014-3636, fdo#82820; Alban Crequy)
    - Disconnect connections that still have a fd pending unmarshalling
      after a new configurable limit, pending_fd_timeout (defaulting to
      150 seconds), removing the possibility of creating an abusive
      connection that cannot be disconnected by setting up a circular
      reference to a connection's file descriptor. (CVE-2014-3637,
      fdo#80559; Alban Crequy)
    - Reduce default for maximum pending replies per connection from
      8192 to 128, mitigating an algorithmic complexity
      denial-of-service attack (CVE-2014-3638, fdo#81053; Alban Crequy)
    - Reduce default for authentication timeout on the system bus from
      30 seconds to 5 seconds, avoiding denial of service by using up
      all unauthenticated connection slots; and when all unauthenticated
      connection slots are used up, make new connection attempts block
      instead of disconnecting them. (CVE-2014-3639, fdo#80919;
      Alban Crequy)
    - On Linux &amp;gt;= 2.6.37-rc4, if sendmsg() fails with ETOOMANYREFS,
      silently drop the message. This prevents an attack in which a
      malicious client can make dbus-daemon disconnect a system service,
      which is a local denial of service. (fdo#80163, CVE-2014-3532;
      Alban Crequy)
    - Track remaining Unix file descriptors correctly when more than one
      message in quick succession contains fds. This prevents another
      attack  which a malicious client can make dbus-daemon disconnect a
      system service. (fdo#79694, fdo#80469, CVE-2014-3533; Alejandro
      Mart?nez Su?rez, Simon McVittie, Alban Crequy)
    - Alban Crequy at Collabora Ltd. discovered and fixed a
      denial-of-service flaw in dbus-daemon, part of the reference
      implementation of D-Bus. Additionally, in highly unusual
      environments the same flaw could lead to a side channel between
      processes that should not be able to communicate. (CVE-2014-3477,
      fdo#78979)
    - CVE-2013-2168: Fix misuse of va_list that could be used as a
      denial of service for system services. Vulnerability reported by
      Alexandru Cornea. (Simon)
  + Other fixes
    - Don't leak memory on out-of-memory while listing activatable or
      active services (fdo#71526, Radoslaw Pajak)
    - fix undefined behaviour in a regression test (fdo#69924, DreamNik)
    - path_namespace='/' in match rules incorrectly matched nothing; it
      now matches everything. (fdo#70799, Simon McVittie)
    - Make dbus_connection_set_route_peer_messages(x, FALSE) behave as
      documented. Previously, it assumed its second parameter was TRUE.
      (fdo#69165, Chengwei Yang)
    - Fix a NULL pointer dereference on an unlikely error path
      (fdo#69327, Sviatoslav Chagaev)
    - If accept4() fails with EINVAL, as it can on older Linux kernels
      with newer glibc, try accept() instead of going into a busy-loop.
      (fdo#69026, Chengwei Yang)
    - If socket() or socketpair() fails with EINVAL or EPROTOTYPE, for
      instance on Hurd or older Linux with a new glibc, try without
      SOCK_CLOEXEC. (fdo#69073; Pino Toscano, Chengwei Yang)
    - Fix a file descriptor leak on an error code path. (fdo#69182,
      Sviatoslav Chagaev)
    - Fix compilation if writev() is unavailable (fdo#69409, Vasiliy
      Balyasnyy)
    - Avoid an infinite busy-loop if a signal interrupts waitpid()
      (fdo#68945, Simon McVittie)
    - Escape addresses containing non-ASCII characters correctly
      (fdo#53499, Chengwei Yang)
    - If malloc() returns NULL in _dbus_string_init() or similar, don't
      free an invalid pointer if the string is later freed (fdo#65959,
      Chengwei Yang)
    - If malloc() returns NULL in dbus_set_error(), don't va_end() a
      va_list that was never va_start()ed (fdo#66300, Chengwei Yang)
    - Fix a regression test on platforms with strict alignment
      (fdo#67279, Colin Walters)
    - Avoid calling function parameters &amp;quot;interface&amp;quot; since certain
      Windows headers have a namespace-polluting macro of that name
      (fdo#66493, Ivan Romanov)
    - Make &amp;quot;make -j check&amp;quot; work (fdo#68852, Simon McVittie)
    - In dbus-daemon, don't crash if a .service file starts with
      key=value (fdo#60853, Chengwei Yang)
    - Fix an assertion failure if we try to activate systemd services
      before systemd connects to the bus (fdo#50199, Chengwei Yang)
    - Avoid compiler warnings for ignoring the return from write()
      (Chengwei Yang)
    - Following Unicode Corrigendum #9, the noncharacters U+nFFFE,
      U+nFFFF, U+FDD0..U+FDEF are allowed in UTF-8 strings again.
      (fdo#63072, Simon McVittie)
    - Diagnose incorrect use of dbus_connection_get_data() with negative
      slot (i.e. before allocating the slot) rather than returning junk
      (fdo#63127, Dan Williams)
    - In the activation helper, when compiled for tests, do not reset
      the system bus address, fixing the regression tests. (fdo#52202,
      Simon)
    - Fix building with Valgrind 3.8, at the cost of causing harmless
      warnings with Valgrind 3.6 on some compilers (fdo#55932,
      Arun Raghavan)
    - Don't leak temporary fds pointing to /dev/null (fdo#56927, Michel
      HERMIER)
    - Create session.d, system.d directories under CMake (fdo#41319,
      Ralf Habacker)
    - Include alloca.h for alloca() if available, fixing compilation on
      Solaris 10 (fdo#63071, Dagobert Michelsen)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100740" comment="dbus-1-x11-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100741" comment="dbus-1-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100742" comment="dbus-1-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100743" comment="dbus-1-devel-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100744" comment="dbus-1-devel-32bit-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100745" comment="dbus-1-devel-doc-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100746" comment="libdbus-1-3-1.6.24-2.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100747" comment="libdbus-1-3-32bit-1.6.24-2.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:399" version="1" class="patch">
	<metadata>
		<title>wireshark: update to 1.10.10 security release</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Wireshark was update to 1.10.10 [bnc#897055]

On openSUSE 12.3, the package was upgraded to 1.10.x from 1.8.x as it was discontinued.

This update fixes vulnerabilities in Wireshark that could allow
an attacker to crash Wireshark or make it become unresponsive by
sending specific packages onto the network or have it loaded via
  a capture file while the dissectors are running. It also contains
  a number of other bug fixes.
  * RTP dissector crash
    wnpa-sec-2014-12 CVE-2014-6421 CVE-2014-6422
  * MEGACO dissector infinite loop
    wnpa-sec-2014-13 CVE-2014-6423
  * Netflow dissector crash
    wnpa-sec-2014-14 CVE-2014-6424
  * RTSP dissector crash
    wnpa-sec-2014-17 CVE-2014-6427
  * SES dissector crash
    wnpa-sec-2014-18 CVE-2014-6428
  * Sniffer file parser crash
    wnpa-sec-2014-19 CVE-2014-6429 CVE-2014-6430 CVE-2014-6431
    CVE-2014-6432
- Further bug fixes as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-1.10.10.html

- includes changes from 1.10.9:
  fixes several crashes triggered by malformed protocol packages
- vulnerabilities fixed:
  * The Catapult DCT2000 and IrDA dissectors could underrun a buffer
    wnpa-sec-2014-08 CVE-2014-5161 CVE-2014-5162 (bnc#889901)
  * The GSM Management dissector could crash
    wnpa-sec-2014-09 CVE-2014-5163 (bnc#889906)
  * The RLC dissector could crash
    wnpa-sec-2014-10 CVE-2014-5164 (bnc#889900)
  * The ASN.1 BER dissector could crash
    wnpa-sec-2014-11 CVE-2014-5165 (bnc#889899)
- Further bug fixes as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-1.10.9.html
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100824" comment="wireshark-1.10.10-1.44.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100825" comment="wireshark-devel-1.10.10-1.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:400" version="1" class="patch">
	<metadata>
		<title>xen: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

XEN was updated to fix various bugs and security issues.

Security issues fixed:
- bnc#897657 - CVE-2014-7188: XSA-108 Improper MSR range used for x2APIC emulation
- bnc#895802 - CVE-2014-7156: XSA-106: Missing privilege level checks in x86 emulation of software interrupts
- bnc#895799 - CVE-2014-7155: XSA-105: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation
- bnc#895798 - CVE-2014-7154: XSA-104: Race condition in HVMOP_track_dirty_vram
- bnc#864801 - CVE-2013-4540: qemu: zaurus: buffer overrun on invalid state load 
- bnc#880751 - CVE-2014-4021: XSA-100: Hypervisor heap contents leaked to guests
- bnc#878841 - CVE-2014-3967,CVE-2014-3968: XSA-96: Vulnerabilities in HVM MSI injection
- bnc#867910 - CVE-2014-2599: XSA-89: HVMOP_set_mem_access is not preemptible
- bnc#842006 - CVE-2013-4344: XSA-65: xen: qemu SCSI REPORT LUNS buffer overflow

Other bugs fixed:
- bnc#896023 - Adjust xentop column layout
- bnc#891539 - xend: fix netif convertToDeviceNumber for running domains
- bnc#820873 - The &amp;quot;long&amp;quot; option doesn't work with &amp;quot;xl list&amp;quot;
- bnc#881900 - XEN kernel panic do_device_not_available()
- bnc#833483 - Boot Failure with xen kernel in UEFI mode with error &amp;quot;No memory for trampoline&amp;quot;
- bnc#862608 - SLES 11 SP3 vm-install should get RHEL 7 support when released
- bnc#858178 - [HP HPS Bug]: SLES11sp3 XEN kiso version cause softlockup on 8 blades npar(480 cpu)
- bnc#865682 - Local attach support for PHY backends using scripts
- bnc#798770 - Improve multipath support for npiv devices
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100831" comment="xen-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100832" comment="xen-devel-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100833" comment="xen-kmp-default-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100834" comment="xen-kmp-desktop-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100835" comment="xen-kmp-pae-4.2.4_04_k3.7.10_1.40-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100836" comment="xen-libs-32bit-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100837" comment="xen-libs-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100838" comment="xen-tools-domU-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100839" comment="xen-doc-html-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100840" comment="xen-doc-pdf-4.2.4_04-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100841" comment="xen-tools-4.2.4_04-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:401" version="1" class="patch">
	<metadata>
		<title>bash: security and bugfix update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
bash was updated to fix a critical security issue, a minor security issue and bugs:

In some circumstances, the shell would evaluate shellcode in environment
variables passed at startup time. This allowed code execution by
local or remote attackers who could pass environment variables to bash
scripts. (CVE-2014-6271)

Fixed a temporary file misuse in _rl_tropen (bnc#868822)
Even if used only by developers to debug readline library do not
open temporary files from public location without O_EXCL  (CVE-2014-2524)

Additional bugfixes:
- Backported corrected german error message for a failing getpwd (bnc#895475)

- Add bash upstream patch 47 to fix a problem where the function
  that shortens pathnames for $PS1 according to the value of
  $PROMPT_DIRTRIM uses memcpy on potentially-overlapping regions
  of memory, when it should use memmove.  The result is garbled
  pathnames in prompt strings.

- Add bash upstream patch 46 to fix a problem introduced by patch
  32 a problem with &amp;quot;$@&amp;quot; and arrays expanding empty positional
  parameters or array elements when using substring expansion,
  pattern substitution, or case modfication.  The empty parameters
  or array elements are removed instead of expanding to empty
  strings (&amp;quot;&amp;quot;).

- Add bash-4.2-strcpy.patch from upstream mailing list to patch
  collection tar ball to avoid when using \w in the prompt and
  changing the directory outside of HOME the a strcpy work on
  overlapping memory areas.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100748" comment="bash-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100749" comment="bash-devel-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100750" comment="bash-doc-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100751" comment="bash-lang-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100752" comment="bash-loadables-4.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100753" comment="libreadline6-32bit-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100754" comment="libreadline6-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100755" comment="readline-devel-32bit-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100756" comment="readline-devel-6.2-61.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100757" comment="readline-doc-6.2-61.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:402" version="1" class="patch">
	<metadata>
		<title>mozilla-nss: update to avoid signature forgery</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Mozilla NSS is vulnerable to a variant of a signature forgery attack previously published by Daniel Bleichenbacher. This is due to lenient parsing of ASN.1 values involved in a signature and could lead to the forging of RSA certificates.		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100758" comment="libfreebl3-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100759" comment="libfreebl3-32bit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100760" comment="libsoftokn3-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100761" comment="libsoftokn3-32bit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100762" comment="mozilla-nss-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100763" comment="mozilla-nss-32bit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100764" comment="mozilla-nss-certs-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100765" comment="mozilla-nss-certs-32bit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100766" comment="mozilla-nss-devel-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100767" comment="mozilla-nss-sysinit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100768" comment="mozilla-nss-sysinit-32bit-3.16.5-1.55.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100769" comment="mozilla-nss-tools-3.16.5-1.55.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:403" version="1" class="patch">
	<metadata>
		<title>bash: security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The command-line shell 'bash' evaluates environment variables, which
allows the injection of characters and might be used to access files on
the system in some circumstances (CVE-2014-7169).

Please note that this issue is different from a previously fixed
vulnerability tracked under CVE-2014-6271 and it is less serious due to
the special, non-default system configuration that is needed to create
an exploitable situation.

To remove further exploitation potential we now limit the
function-in-environment variable to variables prefixed with BASH_FUNC_
. This hardening feature is work in progress and might be improved in
later updates.

Additionaly two more security issues were fixed in bash:
CVE-2014-7186: Nested HERE documents could lead to a crash of bash.

CVE-2014-7187: Nesting of for loops could lead to a crash of bash. 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100770" comment="bash-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100771" comment="bash-devel-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100772" comment="bash-doc-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100773" comment="bash-lang-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100774" comment="bash-loadables-4.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100775" comment="libreadline6-32bit-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100776" comment="libreadline6-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100777" comment="readline-devel-32bit-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100778" comment="readline-devel-6.2-61.15.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100779" comment="readline-doc-6.2-61.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:404" version="1" class="patch">
	<metadata>
		<title>phpMyAdmin: security update to </title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
phpMyAdmin was updated fix a security issues [CVE-2014-7217]
This update contains a fix for a cross-site scripting vulnerability in the
table search and table structure pages which could be trigged
with a crafted ENUM value.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100842" comment="phpMyAdmin-4.1.14.5-1.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:405" version="1" class="patch">
	<metadata>
		<title>update for libvirt</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- CVE-2014-3657: Fix domain deadlock
  fc22b2e7-CVE-2014-3657.patch
  bsc#899484

- CVE-2014-3633: Use correct definition when looking up disk in
  qemu blkiotune
  3e745e8f-CVE-2014-3633.patch
  bsc#897783

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100855" comment="libvirt-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100856" comment="libvirt-client-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100857" comment="libvirt-client-32bit-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100858" comment="libvirt-devel-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100859" comment="libvirt-devel-32bit-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100860" comment="libvirt-doc-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100861" comment="libvirt-lock-sanlock-1.0.2-1.22.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100862" comment="libvirt-python-1.0.2-1.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:406" version="1" class="patch">
	<metadata>
		<title>update for python</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- CVE-2014-7185-buffer-wraparound.patch: potential wraparound/overflow
  in buffer()
  (CVE-2014-7185, bnc#898572)

- CVE-2014-7185-buffer-wraparound.patch: potential wraparound/overflow
  in buffer()
  (CVE-2014-7185, bnc#898572)

- CVE-2014-7185-buffer-wraparound.patch: potential wraparound/overflow
  in buffer()
  (CVE-2014-7185, bnc#898572)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100863" comment="libpython2_7-1_0-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100864" comment="libpython2_7-1_0-32bit-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100865" comment="python-base-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100866" comment="python-base-32bit-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100867" comment="python-devel-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100868" comment="python-xml-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100869" comment="python-doc-2.7-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100870" comment="python-doc-pdf-2.7-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100871" comment="python-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100872" comment="python-32bit-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100873" comment="python-curses-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100874" comment="python-demo-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100875" comment="python-gdbm-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100876" comment="python-idle-2.7.3-10.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100877" comment="python-tk-2.7.3-10.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:407" version="1" class="patch">
	<metadata>
		<title>update for claws-mail</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Update to version 3.10.1(bnc#870858):
  + Add an account preference to allow automatically accepting
    unknown and changed SSL certificates, if they're valid (that
    is, if the root CA is trusted by the distro).
  + RFE 3196, 'When changing quicksearch Search Type, set focus to
    search input box'.
  + PGP/Core plugin: Generate 2048 bit RSA keys.
  + Major code cleanup.
  + Extended claws-mail.desktop with Compose and Receive actions.
  + Fix GConf use with newer Glib.
  + Fix the race fix, now preventing the compose window to be
    closed.
  + Fix &amp;quot;File (null) doesn't exist&amp;quot; error dialog, when attaching a
    non-existing file via --attach
  + Fix spacing in Folderview if the font is far from the system
    font.
  + RSSyl:
    - When parsing RSS 2.0, ignore  tags with a namespace prefix.
    - Check for existence of xmlNode namespace, to prevent NULL
      pointer crashes.
  + Bugs fixed: claws#2728, claws#2981, claws#3170, claws#3179,
    claws#3201, deb#730050.
  + Updated translations.
- Drop claws-mail-3.10.0_uninitialized_variable_git51af19b.patch as
  fixed upstream.

This also fixes CVE-2014-2576.

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100878" comment="claws-mail-3.10.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100879" comment="claws-mail-devel-3.10.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100880" comment="claws-mail-lang-3.10.1-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:408" version="1" class="patch">
	<metadata>
		<title>update for rsyslog</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- Fixed remote PRI DoS vulnerability patch (CVE-2014-3683,bnc#899756)
  [* rsyslog-7.2.7-remote-PRI-DoS-fix-backport_CVE-2014-3634.patch]
- Removed broken, unsupported and dropped by upstream zpipe utility
  from rsyslog-diag-tools package (bnc#890228)

- Remote syslog PRI DoS vulnerability fix (CVE-2014-3634,bnc#897262)
  [+ rsyslog-7.2.7-remote-PRI-DoS-fix-backport_CVE-2014-3634.patch]
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100928" comment="rsyslog-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100929" comment="rsyslog-diag-tools-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100930" comment="rsyslog-doc-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100931" comment="rsyslog-module-dbi-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100932" comment="rsyslog-module-elasticsearch-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100933" comment="rsyslog-module-gssapi-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100934" comment="rsyslog-module-gtls-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100935" comment="rsyslog-module-mmnormalize-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100936" comment="rsyslog-module-mysql-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100937" comment="rsyslog-module-pgsql-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100938" comment="rsyslog-module-relp-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100939" comment="rsyslog-module-snmp-7.2.7-2.13.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100940" comment="rsyslog-module-udpspoof-7.2.7-2.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:409" version="1" class="patch">
	<metadata>
		<title>update to fix CVE-2014-0477</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes a denial of service vulnerability when parsing an empty quoted string (CVE-2014-0477)		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101047" comment="perl-Email-Address-1.892-11.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:410" version="1" class="patch">
	<metadata>
		<title>update for bash</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
- Replace patches bash-4.2-heredoc-eof-delim.patch and
  bash-4.2-parse-exportfunc.patch with the official upstream
  patch levels bash42-052 and bash42-053

- Replace patch bash-4.2-CVE-2014-7187.patch with upstream patch
  level bash42-051

- Make bash-4.2-extra-import-func.patch an optional patch due
  instruction

- Remove and replace patches
  bash-4.2-CVE-2014-6271.patch
  bash-4.2-BSC898604.patch
  bash-4.2-CVE-2014-7169.patch
  with bash upstream patch 48, patch 49, and patch 50
- Add patch bash-4.2-extra-import-func.patch which is based on the
  BSD patch of Christos.  As further enhancements the option
  import-functions is mentioned in the manual page and a shopt
  switch is added to enable and disable import-functions on the fly
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100971" comment="bash-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100972" comment="bash-devel-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100973" comment="bash-doc-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100974" comment="bash-lang-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100975" comment="bash-loadables-4.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100976" comment="libreadline6-32bit-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100977" comment="libreadline6-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100978" comment="readline-devel-32bit-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100979" comment="readline-devel-6.2-61.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100980" comment="readline-doc-6.2-61.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:411" version="1" class="patch">
	<metadata>
		<title>update for getmail</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- getmail 4.46.0 [bnc#900217]
  This release fixes several similar vulnerabilities that could
  allow a man-in-the-middle attacker to read encrypted traffic due
  to pack of certificate verification against the hostname.
  * fix --idle checking Python version incorrectly, resulting in
    incorrect warning about running with Python &amp;lt; 2.5
  * add missing support for SSL certificate checking in POP3 which
    broke POP retrieval in v4.45.0
    [CVE-2014-7275]
- includes changes from 4.45.0:
  * perform hostname-vs-certificate matching of SSL certificate if
    validating the certifcate
    [CVE-2014-7274]
  * fix missing plaintext versions of documentation
- includes changes from 4.44.0: 
  * add extended SSL options for IMAP retrievers, allowing
    certificate verification and other features
    [CVE-2014-7273]
  * fix missing plaintext versions of documentation
  * fix &amp;quot;Header instance has no attribute 'strip'&amp;quot; error which
    cropped up in some configurations

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100991" comment="getmail-4.46.0-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100992" comment="getmail-doc-4.46.0-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:412" version="1" class="patch">
	<metadata>
		<title>update for wpa_supplicant</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- add 0001-Add-os_exec-helper-to-run-external-programs.patch
- add 0002-wpa_cli-Use-os_exec-for-action-script-execution.patch
- fixing CVE-2014-3686 (bnc#900611) trying to abuse the action
  scripts in wpa_cli 
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009100993" comment="wpa_supplicant-1.1-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009100994" comment="wpa_supplicant-gui-1.1-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:413" version="1" class="patch">
	<metadata>
		<title>update for firefox, mozilla-nspr, mozilla-nss</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>


- update to Firefox 33.0 (bnc#900941)
  New features:
  * OpenH264 support (sandboxed)
  * Enhanced Tiles
  * Improved search experience through the location bar
  * Slimmer and faster JavaScript strings
  * New CSP (Content Security Policy) backend
  * Support for connecting to HTTP proxy over HTTPS
  * Improved reliability of the session restoration
  * Proprietary window.crypto properties/functions removed
  Security:
  * MFSA 2014-74/CVE-2014-1574/CVE-2014-1575
    Miscellaneous memory safety hazards
  * MFSA 2014-75/CVE-2014-1576 (bmo#1041512)
    Buffer overflow during CSS manipulation
  * MFSA 2014-76/CVE-2014-1577 (bmo#1012609)
    Web Audio memory corruption issues with custom waveforms
  * MFSA 2014-77/CVE-2014-1578 (bmo#1063327)
    Out-of-bounds write with WebM video
  * MFSA 2014-78/CVE-2014-1580 (bmo#1063733)
    Further uninitialized memory use during GIF rendering
  * MFSA 2014-79/CVE-2014-1581 (bmo#1068218)
    Use-after-free interacting with text directionality
  * MFSA 2014-80/CVE-2014-1582/CVE-2014-1584 (bmo#1049095, bmo#1066190)
    Key pinning bypasses
  * MFSA 2014-81/CVE-2014-1585/CVE-2014-1586 (bmo#1062876, bmo#1062981)
    Inconsistent video sharing within iframe
  * MFSA 2014-82/CVE-2014-1583 (bmo#1015540)
    Accessing cross-origin objects via the Alarms API
    (only relevant for installed web apps)
- requires NSPR 4.10.7
- requires NSS 3.17.1
- removed obsolete patches:
  * mozilla-ppc.patch
  * mozilla-libproxy-compat.patch
- added basic appdata information

- update to SeaMonkey 2.30 (bnc#900941)
  * venkman debugger removed from application and therefore obsolete package seamonkey-venkman
  * MFSA 2014-74/CVE-2014-1574/CVE-2014-1575 Miscellaneous memory safety hazards
  * MFSA 2014-75/CVE-2014-1576 (bmo#1041512) Buffer overflow during CSS manipulation
  * MFSA 2014-76/CVE-2014-1577 (bmo#1012609) Web Audio memory corruption issues with custom waveforms
  * MFSA 2014-77/CVE-2014-1578 (bmo#1063327) Out-of-bounds write with WebM video
  * MFSA 2014-78/CVE-2014-1580 (bmo#1063733) Further uninitialized memory use during GIF rendering
  * MFSA 2014-79/CVE-2014-1581 (bmo#1068218) Use-after-free interacting with text directionality
  * MFSA 2014-80/CVE-2014-1582/CVE-2014-1584 (bmo#1049095, bmo#1066190) Key pinning bypasses
  * MFSA 2014-81/CVE-2014-1585/CVE-2014-1586 (bmo#1062876, bmo#1062981) Inconsistent video sharing within iframe
  * MFSA 2014-82/CVE-2014-1583 (bmo#1015540) Accessing cross-origin objects via the Alarms API (only relevant for installed web apps)
- requires NSPR 4.10.7
- requires NSS 3.17.1
- removed obsolete patches:
  * mozilla-ppc.patch
  * mozilla-libproxy-compat.patch

Changes in mozilla-nss:
- update to 3.17.1 (bnc#897890)
  * Change library's signature algorithm default to SHA256
  * Add support for draft-ietf-tls-downgrade-scsv
  * Add clang-cl support to the NSS build system
  * Implement TLS 1.3:
    * Part 1. Negotiate TLS 1.3
    * Part 2. Remove deprecated cipher suites andcompression.
  * Add support for little-endian powerpc64

- update to 3.17
  * required for Firefox 33
  New functionality:
  * When using ECDHE, the TLS server code may be configured to generate
    a fresh ephemeral ECDH key for each handshake, by setting the
    SSL_REUSE_SERVER_ECDHE_KEY socket option to PR_FALSE. The
    SSL_REUSE_SERVER_ECDHE_KEY option defaults to PR_TRUE, which means
    the server's ephemeral ECDH key is reused for multiple handshakes.
    This option does not affect the TLS client code, which always
    generates a fresh ephemeral ECDH key for each handshake.
  New Macros
  * SSL_REUSE_SERVER_ECDHE_KEY
  Notable Changes:
  * The manual pages for the certutil and pp tools have been updated to
    document the new parameters that had been added in NSS 3.16.2.
  * On Windows, the new build variable USE_STATIC_RTL can be used to
    specify the static C runtime library should be used. By default the
    dynamic C runtime library is used.
Changes in mozilla-nspr:
- update to version 4.10.7
  * bmo#836658: VC11+ defaults to SSE2 builds by default.
  * bmo#979278: TSan: data race nsprpub/pr/src/threads/prtpd.c:103
                PR_NewThreadPrivateIndex.
  * bmo#1026129: Replace some manual declarations of MSVC intrinsics with
                 #include &amp;lt;intrin.h&amp;gt;.
  * bmo#1026469: Use AC_CHECK_LIB instead of MOZ_CHECK_PTHREADS. Skip
                 compiler checks when using MSVC, even when $CC is
                 not literally &amp;quot;cl&amp;quot;.
  * bmo#1034415: NSPR hardcodes the C compiler to cl on Windows.
  * bmo#1042408: Compilation fix for Android &amp;gt; API level 19.
  * bmo#1043082: NSPR's build system hardcodes -MD.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101077" comment="MozillaFirefox-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101078" comment="MozillaFirefox-branding-upstream-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101079" comment="MozillaFirefox-buildsymbols-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101080" comment="MozillaFirefox-devel-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101081" comment="MozillaFirefox-translations-common-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101082" comment="MozillaFirefox-translations-other-33.0-1.90.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101083" comment="mozilla-nspr-32bit-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101084" comment="mozilla-nspr-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101085" comment="mozilla-nspr-devel-4.10.7-1.34.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101086" comment="libfreebl3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101087" comment="libfreebl3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101088" comment="libsoftokn3-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101089" comment="libsoftokn3-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101090" comment="mozilla-nss-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101091" comment="mozilla-nss-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101092" comment="mozilla-nss-certs-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101093" comment="mozilla-nss-certs-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101094" comment="mozilla-nss-devel-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101095" comment="mozilla-nss-sysinit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101096" comment="mozilla-nss-sysinit-32bit-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101097" comment="mozilla-nss-tools-3.17.1-1.59.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101098" comment="seamonkey-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101099" comment="seamonkey-dom-inspector-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101100" comment="seamonkey-irc-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101101" comment="seamonkey-translations-common-2.30-1.61.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101102" comment="seamonkey-translations-other-2.30-1.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:414" version="1" class="patch">
	<metadata>
		<title>update for MozillaThunderbird</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- update to Thunderbird 31.2.0 (bnc#900941)
  * MFSA 2014-74/CVE-2014-1574
    Miscellaneous memory safety hazards
  * MFSA 2014-75/CVE-2014-1576 (bmo#1041512)
    Buffer overflow during CSS manipulation
  * MFSA 2014-76/CVE-2014-1577 (bmo#1012609)
    Web Audio memory corruption issues with custom waveforms
  * MFSA 2014-77/CVE-2014-1578 (bmo#1063327)
    Out-of-bounds write with WebM video
  * MFSA 2014-79/CVE-2014-1581 (bmo#1068218)
    Use-after-free interacting with text directionality
  * MFSA 2014-81/CVE-2014-1585/CVE-2014-1586 (bmo#1062876, bmo#1062981)
    Inconsistent video sharing within iframe

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101103" comment="MozillaThunderbird-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101104" comment="MozillaThunderbird-buildsymbols-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101105" comment="MozillaThunderbird-devel-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101106" comment="MozillaThunderbird-translations-common-31.2.0-61.63.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101107" comment="MozillaThunderbird-translations-other-31.2.0-61.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:415" version="1" class="patch">
	<metadata>
		<title>zeromq: Security update</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This udpate for zeromq fixes the following non-security and security-issues:
Update to version 4.0.4, for a detailed description see /usr/share/doc/packages/zeromq-devel/NEWS
- Add libsodium dep for testsuite where possible
- Version bump to 4.0.5 fixes bnc#898917 CVE-2014-7202 and CVE-2014-7203: 
  * Fixed CURVE mechanism does not verify short term nonces.
  * Fixed stream_engine is vulnerable to downgrade attacks.
  * Fixed assertion failure for WSAENOTSOCK on Windows.
  * Fixed race condition while connecting inproc sockets.
  * Fixed bump so library number to 4.0.0
  * Fixed assertion failed: !more (fq.cpp:99) after many ZAP requests.
  * Fixed lost first part of message over inproc://.
  * Fixed keep-alive on Windows.
- Enable tests.
- Move to 'download_files' source service which is in better shap and easier to use
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101166" comment="libzmq4-4.0.5-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101167" comment="zeromq-4.0.5-2.4.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101168" comment="zeromq-devel-4.0.5-2.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:416" version="1" class="patch">
	<metadata>
		<title>update for openssl</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
The following issues were fixed in this release:

CVE-2014-3566: SSLv3 POODLE attack (bnc#901223)
CVE-2014-3513, CVE-2014-3567:  DTLS memory leak and session ticket memory leak		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101049" comment="libopenssl-devel-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101050" comment="libopenssl-devel-32bit-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101051" comment="libopenssl1_0_0-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101052" comment="libopenssl1_0_0-32bit-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101053" comment="openssl-1.0.1j-1.68.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101054" comment="openssl-doc-1.0.1j-1.68.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:417" version="1" class="patch">
	<metadata>
		<title>update to fix CVE-2014-3660</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This update fixes a denial of service vulnerability when expanding recursive entity (CVE-2014-3660) bnc#901546		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101055" comment="libxml2-2-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101056" comment="libxml2-2-32bit-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101057" comment="libxml2-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101058" comment="libxml2-devel-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101059" comment="libxml2-devel-32bit-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101060" comment="libxml2-doc-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101061" comment="libxml2-tools-2.9.0-2.33.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101062" comment="python-libxml2-2.9.0-2.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:418" version="1" class="patch">
	<metadata>
		<title>update for phpMyAdmin</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- phpMyAdmin 4.1.14.6 [boo#902154] [CVE-2014-8326]
  This release fixes cross-site scripting vulnerabilities in the
  SQL debug output and server monitor pages. This developer option
  is not enabled by default.
  - sf#4562 [security] XSS in debug SQL output
  - sf#4563 [security] XSS in monitor query analyzer

		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101139" comment="phpMyAdmin-4.1.14.6-1.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:419" version="1" class="patch">
	<metadata>
		<title>Update for gnu-efi, pesign, shim</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
shim was updated to fix several security issues.

- OOB read access when parsing DHCPv6 packets (remote DoS) (CVE-2014-3675).
- Heap overflow when parsing IPv6 addresses provided by tftp:// DHCPv6 boot option (RCE) (CVE-2014-3676).
- Memory corruption when processing user provided MOK lists (CVE-2014-3677).

More information is available at https://bugzilla.novell.com/show_bug.cgi?id=889332

To enable this update gnu-efi was updated to 3.0u and pesign to version 0.109
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105191" comment="gnu-efi-3.0u-6.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105192" comment="pesign-0.109-3.19.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105193" comment="shim-0.7.318.81ee561d-3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:420" version="1" class="patch">
	<metadata>
		<title>update for pidgin</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

  The following issues were fixed in this update:
  + General:
    - Check the basic constraints extension when validating
      SSL/TLS certificates. This fixes a security hole that allowed
      a malicious man-in-the-middle to impersonate an IM server or
      any other https endpoint. This affected both the NSS and
      GnuTLS plugins (CVE-2014-3694, boo#902495).
    - Allow and prefer TLS 1.2 and 1.1 when using the NSS plugin
      for SSL (im#15909).
  + libpurple3 compatibility:
    - Encrypted account passwords are preserved until the new one
      is set.
    - Fix loading Google Talk and Facebook XMPP accounts.
  + Groupwise: Fix potential remote crash parsing server message
    that indicates that a large amount of memory should be
    allocated (CVE-2014-3696, boo#902410).
  + IRC: Fix a possible leak of unencrypted data when using /me
    command with OTR (im#15750).
  + MXit: Fix potential remote crash parsing a malformed emoticon
    response (CVE-2014-3695, boo#902409).
  + XMPP:
    - Fix potential information leak where a malicious XMPP server
      and possibly even a malicious remote user could create a
      carefully crafted XMPP message that causes libpurple to send
      an XMPP message containing arbitrary memory (CVE-2014-3698,
      boo#902408).
  + Yahoo: Fix login when using the GnuTLS library for TLS
    connections (im#16172, boo#874606).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101169" comment="libpurple-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101170" comment="pidgin-branding-openSUSE-12.2-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101171" comment="pidgin-otr-4.0.0-2.11.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101172" comment="finch-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101173" comment="finch-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101174" comment="libpurple-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101175" comment="libpurple-branding-upstream-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101176" comment="libpurple-devel-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101177" comment="libpurple-lang-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101178" comment="libpurple-meanwhile-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101179" comment="libpurple-tcl-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101180" comment="pidgin-2.10.10-4.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101181" comment="pidgin-devel-2.10.10-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:421" version="1" class="patch">
	<metadata>
		<title>update for php5</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

- security update:
  * CVE-2014-3670 [bnc#902357]
  * CVE-2014-3669 [bnc#902360]
  * CVE-2014-3668 [bnc#902368]
- added patches:
  * php-CVE-2014-3670.patch
  * php-CVE-2014-3669.patch
  * php-CVE-2014-3668.patch
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101182" comment="apache2-mod_php5-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101183" comment="php5-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101184" comment="php5-bcmath-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101185" comment="php5-bz2-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101186" comment="php5-calendar-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101187" comment="php5-ctype-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101188" comment="php5-curl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101189" comment="php5-dba-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101190" comment="php5-devel-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101191" comment="php5-dom-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101192" comment="php5-enchant-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101193" comment="php5-exif-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101194" comment="php5-fastcgi-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101195" comment="php5-fileinfo-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101196" comment="php5-fpm-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101197" comment="php5-ftp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101198" comment="php5-gd-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101199" comment="php5-gettext-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101200" comment="php5-gmp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101201" comment="php5-iconv-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101202" comment="php5-imap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101203" comment="php5-intl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101204" comment="php5-json-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101205" comment="php5-ldap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101206" comment="php5-mbstring-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101207" comment="php5-mcrypt-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101208" comment="php5-mssql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101209" comment="php5-mysql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101210" comment="php5-odbc-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101211" comment="php5-openssl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101212" comment="php5-pcntl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101213" comment="php5-pdo-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101214" comment="php5-pear-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101215" comment="php5-pgsql-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101216" comment="php5-phar-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101217" comment="php5-posix-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101218" comment="php5-pspell-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101219" comment="php5-readline-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101220" comment="php5-shmop-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101221" comment="php5-snmp-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101222" comment="php5-soap-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101223" comment="php5-sockets-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101224" comment="php5-sqlite-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101225" comment="php5-suhosin-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101226" comment="php5-sysvmsg-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101227" comment="php5-sysvsem-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101228" comment="php5-sysvshm-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101229" comment="php5-tidy-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101230" comment="php5-tokenizer-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101231" comment="php5-wddx-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101232" comment="php5-xmlreader-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101233" comment="php5-xmlrpc-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101234" comment="php5-xmlwriter-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101235" comment="php5-xsl-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101236" comment="php5-zip-5.3.17-3.38.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101237" comment="php5-zlib-5.3.17-3.38.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:422" version="1" class="patch">
	<metadata>
		<title>libserf: Disable SSLv2 and SSLv3.</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
libserf was updated to disable SSLv2 and SSLv3.
	  
libserf was updated to version 1.3.8 on openSUSE 13.1 and 13.2.
This release also fixes a problem with handling very large gzip-encoded
HTTP responses.

For openSUSE 12.3 libserf 1.1.1 was patched to disable SSLv2 and SSLv3.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101334" comment="libserf-1-0-1.1.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101335" comment="libserf-1.1.1-2.8.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101336" comment="libserf-devel-1.1.1-2.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:423" version="1" class="patch">
	<metadata>
		<title>quassel: Fixed out-of-bound read</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
quassel was updated to fix an out-of-bound read (CVE-2014-8483).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101238" comment="quassel-0.8.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101239" comment="quassel-base-0.8.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101240" comment="quassel-client-0.8.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101241" comment="quassel-core-0.8.0-5.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101242" comment="quassel-mono-0.8.0-5.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:424" version="1" class="patch">
	<metadata>
		<title>update for wget</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
wget was updated to version 1.16 to fix one security issue.

The following security issue was fixed:

- Fix for symlink attack which could allow a malicious ftp server to create arbitrary files, directories or
  symbolic links and set their permissions when retrieving a directory recursively through FTP (CVE-2014-4877).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101243" comment="wget-1.16-15.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:425" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
ImageMagick was updated to fix three security issues.
	  
These security issues were fixed:
- Out-of-bounds memory access in PCX parser (CVE-2014-8355).
- Out-of-bounds memory access in resize code (CVE-2014-8354).
- Out-of-bounds memory error in DCM decode (CVE-2014-8562).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101337" comment="ImageMagick-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101338" comment="ImageMagick-devel-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101339" comment="ImageMagick-devel-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101340" comment="ImageMagick-doc-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101341" comment="ImageMagick-extra-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101342" comment="libMagick++-devel-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101343" comment="libMagick++5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101344" comment="libMagickCore5-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101345" comment="libMagickCore5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101346" comment="libMagickWand5-32bit-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101347" comment="libMagickWand5-6.7.8.8-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101348" comment="perl-PerlMagick-6.7.8.8-4.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:426" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
libvirt was updated to fix one security issue.

This security issue was fixed:
- Security issue with migratable flag (CVE-2014-7823).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101916" comment="libvirt-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101917" comment="libvirt-client-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101918" comment="libvirt-client-32bit-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101919" comment="libvirt-devel-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101920" comment="libvirt-devel-32bit-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101921" comment="libvirt-doc-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101922" comment="libvirt-lock-sanlock-1.0.2-1.26.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101923" comment="libvirt-python-1.0.2-1.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:427" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
dbus-1 was updated to version 1.6.26 to fix one security issue and several other issues.

This security issue was fixed:
- Increase dbus-daemon's RLIMIT_NOFILE rlimit to 65536 to stop an attacker from exhausting the system bus' file descriptors (CVE-2014-7824).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101880" comment="dbus-1-x11-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101881" comment="dbus-1-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101882" comment="dbus-1-32bit-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101883" comment="dbus-1-devel-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101884" comment="dbus-1-devel-32bit-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101885" comment="dbus-1-devel-doc-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101886" comment="libdbus-1-3-1.6.26-2.30.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101887" comment="libdbus-1-3-32bit-1.6.26-2.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:428" version="1" class="patch">
	<metadata>
		<title>openssl: fixed elliptic curve handshake failure</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This openssl update fixes a TLS handshake problem when elliptic curves
are in use.
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102017" comment="libopenssl-devel-1.0.1j-1.71.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102018" comment="libopenssl-devel-32bit-1.0.1j-1.71.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102019" comment="libopenssl1_0_0-1.0.1j-1.71.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102020" comment="libopenssl1_0_0-32bit-1.0.1j-1.71.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102021" comment="openssl-1.0.1j-1.71.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102022" comment="openssl-doc-1.0.1j-1.71.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:429" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
gnutls was updated to fix one security issue.
	  
This security issue was fixed:
- Parsing problem in elliptic curve blobs over TLS that could lead to remote crashes (CVE-2014-8564).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009101924" comment="gnutls-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101925" comment="libgnutls-devel-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101926" comment="libgnutls-devel-32bit-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101927" comment="libgnutls-openssl-devel-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101928" comment="libgnutls-openssl27-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101929" comment="libgnutls28-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101930" comment="libgnutls28-32bit-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101931" comment="libgnutlsxx-devel-3.0.28-1.18.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009101932" comment="libgnutlsxx28-3.0.28-1.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:430" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-sprockets-2_2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
rubygem-sprockets-2_2 was updated to fix one security issue.

This security issue was fixed:
- Arbitrary file existence disclosure (CVE-2014-7819).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102080" comment="rubygem-sprockets-2_2-2.2.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102081" comment="rubygem-sprockets-2_2-doc-2.2.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:431" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-sprockets-2_1</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
rubygem-sprockets-2_1 was updated to fix one security issue.

This security issue was fixed:
- Arbitrary file existence disclosure (CVE-2014-7819).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102082" comment="rubygem-sprockets-2_1-2.1.3-4.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102083" comment="rubygem-sprockets-2_1-doc-2.1.3-4.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:432" version="1" class="patch">
	<metadata>
		<title>update for wireshark</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
wireshark was updated to fix five security issues.
	  
These security issues were fixed:
- SigComp UDVM buffer overflow (CVE-2014-8710).
- AMQP crash (CVE-2014-8711).
- NCP crashes (CVE-2014-8712, CVE-2014-8713).
- TN5250 infinite loops (CVE-2014-8714).

For openSUSE 12.3 and 13.1 further bug fixes and updated protocol support are described in:
https://www.wireshark.org/docs/relnotes/wireshark-1.10.11.html

For openSUSE 13.2 further bug fixes and updated protocol support are described in:
https://www.wireshark.org/docs/relnotes/wireshark-1.12.2.html
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102084" comment="wireshark-1.10.11-1.48.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102085" comment="wireshark-devel-1.10.11-1.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:433" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
ImageMagick was updated to fix one security issue.

This security issue was fixed:
- Crafted jpeg file could lead to DOS (CVE-2014-8716).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102037" comment="ImageMagick-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102038" comment="ImageMagick-devel-32bit-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102039" comment="ImageMagick-devel-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102040" comment="ImageMagick-doc-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102041" comment="ImageMagick-extra-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102042" comment="libMagick++-devel-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102043" comment="libMagick++5-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102044" comment="libMagickCore5-32bit-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102045" comment="libMagickCore5-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102046" comment="libMagickWand5-32bit-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102047" comment="libMagickWand5-6.7.8.8-4.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102048" comment="perl-PerlMagick-6.7.8.8-4.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:434" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-sprockets</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
rubygem-sprockets was updated to fix one security issue.

This security issue was fixed:
- Arbitrary file existence disclosure (CVE-2014-7819).
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102100" comment="rubygem-sprockets-2.8.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102101" comment="rubygem-sprockets-doc-2.8.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:435" version="1" class="patch">
	<metadata>
		<title>Security update for file</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
file was updated to fix one security issue.

This security issue was fixed:
- Out-of-bounds read in elf note headers (CVE-2014-3710).
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102102" comment="file-5.11-12.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102103" comment="file-devel-5.11-12.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102104" comment="libmagic-data-5.11-12.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102105" comment="libmagic1-32bit-5.11-12.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102106" comment="libmagic1-5.11-12.27.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102107" comment="python-magic-5.11-12.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:436" version="1" class="patch">
	<metadata>
		<title>Security update for clamav</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
clamav was updated to version 0.98.5 to fix two security issues.

These security issues were fixed:
- Segmentation fault when processing certain files (CVE-2013-6497).
- Heap-based buffer overflow when scanning crypted PE files (CVE-2014-9050).

The following non-security issues were fixed:
- Support for the XDP file format and extracting, decoding, and
  scanning PDF files within XDP files.
- Addition of shared library support for LLVM versions 3.1 - 3.5
  for the purpose of just-in-time(JIT) compilation of ClamAV
  bytecode signatures.
- Enhancements to the clambc command line utility to assist
  ClamAV bytecode signature authors by providing introspection
  into compiled bytecode programs.
- Resolution of many of the warning messages from ClamAV compilation.
- Improved detection of malicious PE files.
- ClamAV 0.98.5 now works with OpenSSL in FIPS compliant
  mode (bnc#904207).
- Fix server socket setup code in clamd (bnc#903489).
- Change updateclamconf to prefer the state of the old config
  file even for commented-out options (bnc#903719).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102494" comment="clamav-0.98.5-5.30.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:437" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-3_2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
rubygem-actionpack-3_2 was updated to fix two security issues.

These security issues were fixed:
- Arbitrary file existence disclosure (CVE-2014-7829).
- Arbitrary file existence disclosure (CVE-2014-7818).
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102108" comment="rubygem-actionpack-3_2-3.2.12-1.32.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102109" comment="rubygem-actionpack-3_2-doc-3.2.12-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:438" version="1" class="patch">
	<metadata>
		<title>Security update for phpMyAdmin</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
phpMyAdmin was updated to fix four security issues.

For openSUSE 12.3 and 13.1, phpMyAdmin was updated to 4.1.14.7.
For openSUSE 13.2, phpMyAdmin was updated to to 4.2.12.

These security issues were fixed:
- XSS vulnerability in error reporting functionality (CVE-2014-8960).
- Local file inclusion vulnerability (CVE-2014-8959).
- Multiple XSS vulnerabilities (CVE-2014-8958).
- Leakage of line count of an arbitrary file (CVE-2014-8961).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102495" comment="phpMyAdmin-4.1.14.7-1.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:439" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_wsgi</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
apache2-mod_wsgi was updated to fix one security issue.

This security issue was fixed:
- Failure to handle errors when attempting to drop group privileges (CVE-2014-8583).
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102571" comment="apache2-mod_wsgi-3.3-12.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:440" version="1" class="patch">
	<metadata>
		<title>Security update for icecast</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
icecast was updated to fix two security issues.

These security issues were fixed:
- Supplementary groups were not overriden (CVE-2014-9091).
- Possible leak of on-connect scripts (CVE-2014-9018).
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102572" comment="icecast-2.3.2-72.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:441" version="1" class="patch">
	<metadata>
		<title>Security update for flac</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
flac was updated to fix two security issues.

These security issues were fixed:
- Stack overflow may result in arbitrary code execution (CVE-2014-8962).
- Heap overflow via specially crafted .flac files (CVE-2014-9028).
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102573" comment="flac-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102574" comment="flac-devel-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102575" comment="flac-devel-32bit-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102576" comment="libFLAC++6-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102577" comment="libFLAC++6-32bit-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102578" comment="libFLAC8-1.2.1_git201212051942-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102579" comment="libFLAC8-32bit-1.2.1_git201212051942-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:442" version="1" class="patch">
	<metadata>
		<title>Security update for ruby19</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
ruby19 was updated to fix two security issues.

These security issues were fixed:
- Denial Of Service XML Expansion (CVE-2014-8080).
- Denial Of Service XML Expansion (CVE-2014-8090).

Note: These are two separate issues.
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102580" comment="ruby19-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102581" comment="ruby19-devel-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102582" comment="ruby19-devel-extra-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102583" comment="ruby19-doc-ri-1.9.3.p392-1.21.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102584" comment="ruby19-tk-1.9.3.p392-1.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:443" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
openvpn was updated to fix a denial-of-service vulnerability
  where an authenticated client could stop the server by triggering
  a server-side ASSERT (bnc#907764,CVE-2014-8104),
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102585" comment="openvpn-2.2.2-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102586" comment="openvpn-auth-pam-plugin-2.2.2-9.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102587" comment="openvpn-down-root-plugin-2.2.2-9.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:444" version="1" class="patch">
	<metadata>
		<title>Security update for apache2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This apache version update fixes various security and non security issues.

- Updated to the 2.2.29
  * Changes between 2.2.22 and 2.2.29:
    http://www.apache.org/dist/httpd/CHANGES_2.2
  * The following patches are no longer needed and were removed:
    * httpd-2.2.x-bnc798733-SNI_ignorecase.diff
    * httpd-2.2.x-bnc806458-mod_imagemap-xss.diff
    * httpd-2.2.x-bnc806458-mod_info_ap_get_server_name-xss.diff
    * httpd-2.2.x-bnc806458-mod_proxy_ftp-xss.diff
    * httpd-2.2.x-bnc806458-util_ldap_cache_mgr-xss.diff
    * httpd-2.2.x-bnc807152-mod_balancer_handler_xss.diff
    * httpd-mod_deflate_head.patch
    * httpd-new_pcre.patch
    * httpd-2.2.22-SSLCompression_CRIME_mitigation.patch
    * httpd-2.2.19-linux3.patch
    * httpd-2.2.x-bnc829056-CVE-2013-1896-pr1482522-mod_dav.diff
    * httpd-2.2.x-bnc829057-CVE-2013-1862-mod_rewrite_terminal_escape_sequences.diff
    * httpd-2.2.x-bnc869105-CVE-2013-6438-mod_dav-dos.diff
    * httpd-2.2.x-bnc869106-CVE-2014-0098-log_cookie_c.diff
    * httpd-2.2.x-bnc887765-CVE-2014-0226-mod_status_race.diff
    * httpd-2.2.x-bnc887768-CVE-2014-0231_mod_cgid_DoS_via_no_stdin_read.diff
    * httpd-2.2.x-bnc777260-CVE-2012-2687-mod_negotiation_filename_xss.diff
    * httpd-2.2.x-CVE-2011-3368-server_protocl_c.diff
  * The following patches were updated for the current Apache version:
    * apache2-mod_ssl_npn.patch
    * httpd-2.0.54-envvars.dif
    * httpd-2.2.x-bnc690734.patch
    * ssl-mode-release-buffers.patch
  *  bnc#871310 fixed in Apache httpd 2.2.29
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102728" comment="apache2-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102729" comment="apache2-devel-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102730" comment="apache2-doc-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102731" comment="apache2-event-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102732" comment="apache2-example-pages-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102733" comment="apache2-itk-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102734" comment="apache2-prefork-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102735" comment="apache2-utils-2.2.29-10.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102736" comment="apache2-worker-2.2.29-10.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:445" version="1" class="patch">
	<metadata>
		<title>Security update for cpio</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This cpio update fixes the following secuirty issue:

- fix an OOB write with cpio -i (bnc#907456) (CVE-2014-9112)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102737" comment="cpio-2.11-21.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102738" comment="cpio-lang-2.11-21.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:446" version="1" class="patch">
	<metadata>
		<title>Security update for libyaml</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This libyaml update fixes the following security issue:

- bnc#907809: assert failure when processing wrapped strings 
  (CVE-2014-9130)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102700" comment="libyaml-0-2-0.1.3-11.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102701" comment="libyaml-0.1.3-11.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102702" comment="libyaml-devel-0.1.3-11.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:447" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_7_0-openjdk</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This openjdk update fixes the following security and non security issues:

- Upgrade to 2.4.8 (bnc#887530)
  * Changed back from gzipped tarball to xz
  * Changed the keyring file to add Andrew John Hughes that signed
    the icedtea package
  * Change ZERO to AARCH64 tarball
- Removed patches:
  * gstackbounds.patch
  * java-1.7.0-openjdk-ppc-zero-jdk.patch
  * java-1.7.0-openjdk-ppc-zero-hotspot.patch
    - Integrated in upstream icedtea
  * java-1.7.0-openjdk-makefiles-zero.patch
    - Does not apply on the AARCH64 tarball, since the change from
      DEFAULT and ZERO tarball to DEFAULT and AARCH64
- Upstream changes since 2.4.4:
  * Security fixes
    - S8029755, CVE-2014-4209: Enhance subject class
    - S8030763: Validate global memory allocation
    - S8031340, CVE-2014-4264: Better TLS/EC management
    - S8031346, CVE-2014-4244: Enhance RSA key handling
    - S8031540: Introduce document horizon
    - S8032536: JVM resolves wrong method in some unusual cases
    - S8033055: Issues in 2d
    - S8033301, CVE-2014-4266: Build more informative InfoBuilder
    - S8034267: Probabilistic native crash
    - S8034272: Do not cram data into CRAM arrays
    - S8034985, CVE-2014-2483: Better form for Lambda Forms
    - S8035004, CVE-2014-4252: Provider provides less service
    - S8035009, CVE-2014-4218: Make Proxy representations consistent
    - S8035119, CVE-2014-4219: Fix exceptions to bytecode verification
    - S8035699, CVE-2014-4268: File choosers should be choosier
    - S8035788. CVE-2014-4221: Provide more consistency for lookups
    - S8035793, CVE-2014-4223: Maximum arity maxed out
    - S8036571: (process) Process process arguments carefully
    - S8036800: Attribute OOM to correct part of code
    - S8037046: Validate libraries to be loaded
    - S8037076, CVE-2014-2490: Check constant pool constants
    - S8037157: Verify &amp;lt;init&amp;gt; call
    - S8037162, CVE-2014-4263: More robust DH exchanges
    - S8037167, CVE-2014-4216: Better method signature resolution
    - S8039520, CVE-2014-4262: More atomicity of atomic updates
    - S8023046: Enhance splashscreen support
    - S8025005: Enhance CORBA initializations
    - S8025010, CVE-2014-2412: Enhance AWT contexts
    - S8025030, CVE-2014-2414: Enhance stream handling
    - S8025152, CVE-2014-0458: Enhance activation set up
    - S8026067: Enhance signed jar verification
    - S8026163, CVE-2014-2427: Enhance media provisioning
    - S8026188, CVE-2014-2423: Enhance envelope factory
    - S8026200: Enhance RowSet Factory
    - S8026716, CVE-2014-2402: (aio) Enhance asynchronous channel handling
    - S8026736, CVE-2014-2398: Enhance Javadoc pages
    - S8026797, CVE-2014-0451: Enhance data transfers
    - S8026801, CVE-2014-0452: Enhance endpoint addressing
    - S8027766, CVE-2014-0453: Enhance RSA processing
    - S8027775: Enhance ICU code.
    - S8027841, CVE-2014-0429: Enhance pixel manipulations
    - S8028385: Enhance RowSet Factory
    - S8029282, CVE-2014-2403: Enhance CharInfo set up
    - S8029286: Enhance subject delegation
    - S8029699: Update Poller demo
    - S8029730: Improve audio device additions
    - S8029735: Enhance service mgmt natives
    - S8029740, CVE-2014-0446: Enhance handling of loggers
    - S8029745, CVE-2014-0454: Enhance algorithm checking
    - S8029750: Enhance LCMS color processing (in-tree LCMS)
    - S8029760, CVE-2013-6629: Enhance AWT image libraries (in-tree libjpeg)
    - S8029844, CVE-2014-0455: Enhance argument validation
    - S8029854, CVE-2014-2421: Enhance JPEG decodings
    - S8029858, CVE-2014-0456: Enhance array copies
    - S8030731, CVE-2014-0460: Improve name service robustness
    - S8031330: Refactor ObjectFactory
    - S8031335, CVE-2014-0459: Better color profiling (in-tree LCMS)
    - S8031352, CVE-2013-6954: Enhance PNG handling (in-tree libpng)
    - S8031394, CVE-2014-0457: (sl) Fix exception handling in ServiceLoader
    - S8031395: Enhance LDAP processing
    - S8032686, CVE-2014-2413: Issues with method invoke
    - S8033618, CVE-2014-1876: Correct logging output
    - S8034926, CVE-2014-2397: Attribute classes properly
    - S8036794, CVE-2014-0461: Manage JavaScript instances
  * Backports
    - S5049299: (process) Use posix_spawn, not fork, on S10 to avoid swap exhaustion
    - S6571600: JNI use results in UnsatisfiedLinkError looking for libmawt.so
    - S7131153: GetDC called way too many times - causes bad performance.
    - S7190349: [macosx] Text (Label) is incorrectly drawn with a rotated g2d
    - S8001108: an attempt to use &amp;quot;&amp;lt;init&amp;gt;&amp;quot; as a method name should elicit NoSuchMethodException
    - S8001109: arity mismatch on a call to spreader method handle should elicit IllegalArgumentException
    - S8008118: (process) Possible null pointer dereference in jdk/src/solaris/native/java/lang/UNIXProcess_md.c
    - S8013611: Modal dialog fails to obtain keyboard focus
    - S8013809: deadlock in SSLSocketImpl between between write and close
    - S8013836: getFirstDayOfWeek reports wrong day for pt-BR locale
    - S8014460: Need to check for non-empty EXT_LIBS_PATH before using it
    - S8019853: Break logging and AWT circular dependency
    - S8019990: IM candidate window appears on the South-East corner of the display.
    - S8020191: System.getProperty(&amp;quot;os.name&amp;quot;) returns &amp;quot;Windows NT (unknown)&amp;quot; on Windows 8.1
    - S8022452: Hotspot needs to know about Windows 8.1 and Windows Server 2012 R2
    - S8023990: Regression: postscript size increase from 6u18
    - S8024283: 10 nashorn tests fail with similar stack trace InternalError with cause being NoClassDefFoundError
    - S8024616: JSR292: lazily initialize core NamedFunctions used for bootstrapping
    - S8024648: 7141246 &amp;amp; 8016131 break Zero port (AArch64 only)
    - S8024830: SEGV in org.apache.lucene.codecs.compressing.CompressingTermVectorsReader.get
    - S8025588: [macosx] Frozen AppKit thread in 7u40
    - S8026404: Logging in Applet can trigger ACE: access denied (&amp;quot;java.lang.RuntimePermission&amp;quot; &amp;quot;modifyThreadGroup&amp;quot;)
    - S8026705: [TEST_BUG] java/beans/Introspector/TestTypeResolver.java failed
    - S8027196: Increment minor version of HSx for 7u55 and initialize the build number
    - S8027212: java/nio/channels/Selector/SelectAfterRead.java fails intermittently
    - S8028285: RMI Thread can no longer call out to AWT
    - S8029177: [Parfait] warnings from b117 for jdk.src.share.native.com.sun.java.util.jar: JNI exception pending
    - S8030655: Regression: 14_01 Security fix 8024306 causes test failures
    - S8030813: Signed applet fails to load when CRLs are stored in an LDAP directory
    - S8030822: (tz) Support tzdata2013i
    - S8031050: (thread) Change Thread initialization so that thread name is set before invoking SecurityManager
    - S8031075: [Regression] focus disappears with shift+tab on dialog having one focus component
    - S8031462: Fonts with morx tables are broken with latest ICU fixes
    - S8032585: JSR292: IllegalAccessError when attempting to invoke protected method from different package
    - S8032740: Need to create SE Embedded Source Bundles in 7 Release
    - S8033278: Missed access checks for Lookup.unreflect* after 8032585
    - S8034772: JDK-8028795 brought a specification change to 7u55 release and caused JCK7 signature test failure
    - S8035283: Second phase of branch shortening doesn't account for loop alignment
    - S8035613: With active Securitymanager JAXBContext.newInstance fails
    - S8035618: Four api/org_omg/CORBA TCK tests fail under plugin only
    - S8036147: Increment hsx 24.55 build to b02 for 7u55-b11
    - S8036786: Update jdk7 testlibrary to match jdk8
    - S8036837: Increment hsx 24.55 build to b03 for 7u55-b12
    - S8037012: (tz) Support tzdata2014a
    - S8038306: (tz) Support tzdata2014b
    - S8038392: Generating prelink cache breaks JAVA 'jinfo' utility normal behavior
    - S8042264: 7u65 l10n resource file translation update 1
    - S8042582: Test java/awt/KeyboardFocusmanager/ChangeKFMTest/ChangeKFMTest.html fails on Windows x64
    - S8042590: Running form URL throws NPE
    - S8042789: org.omg.CORBA.ORBSingletonClass loading no longer uses context class loader
    - S8043012: (tz) Support tzdata2014c
    - S8004145: New improved hgforest.sh, ctrl-c now properly terminates mercurial processes.
    - S8007625: race with nested repos in /common/bin/hgforest.sh
    - S8011178: improve common/bin/hgforest.sh python detection (MacOS)
    - S8011342: hgforest.sh : 'python --version' not supported on older python
    - S8011350: hgforest.sh uses non-POSIX sh features that may fail with some shells
    - S8024200: handle hg wrapper with space after #!
    - S8025796: hgforest.sh could trigger unbuffered output from hg without complicated machinations
    - S8028388: 9 jaxws tests failed in nightly build with java.lang.ClassCastException
    - S8031477: [macosx] Loading AWT native library fails
    - S8032370: No &amp;quot;Truncated file&amp;quot; warning from IIOReadWarningListener on JPEGImageReader
    - S8035834: InetAddress.getLocalHost() can hang after JDK-8030731 was fixed
    - S8009062: poor performance of JNI AttachCurrentThread after fix for 7017193
    - S8035893: JVM_GetVersionInfo fails to zero structure
    - Re-enable the 'gamma' test at the end of the HotSpot build, but only for HotSpot based bootstrap JDKs.
    - S8015976: OpenJDK part of bug JDK-8015812 [TEST_BUG] Tests have conflicting test descriptions
    - S8022698: javax/script/GetInterfaceTest.java fails since 7u45 b04 with -agentvm option
    - S8022868: missing codepage Cp290 at java runtime
    - S8023310: Thread contention in the method Beans.IsDesignTime()
    - S8024461: [macosx] Java crashed on mac10.9 for swing and 2d function manual test
    - S8025679: Increment minor version of HSx for 7u51 and initialize the build number
    - S8026037: [TESTBUG] sun/security/tools/jarsigner/warnings.sh test fails on Solaris
    - S8026304: jarsigner output bad grammar
    - S8026772: test/sun/util/resources/TimeZone/Bug6317929.java failing
    - S8026887: Make issues due to failed large pages allocations easier to debug
    - S8027204: Revise the update of 8026204 and 8025758
    - S8027224: test regression - ClassNotFoundException
    - S8027370: Support tzdata2013h
    - S8027378: Two closed/javax/xml/8005432 fails with jdk7u51b04
    - S8027787: 7u51 l10n resource file translation update 1
    - S8027837: JDK-8021257 causes CORBA build failure on emdedded platforms
    - S8027943: serial version of com.sun.corba.se.spi.orbutil.proxy.CompositeInvocationHandlerImpl changed in 7u45
    - S8027944: Increment hsx 24.51 build to b02 for 7u51-b07
    - S8028057: Modify jarsigner man page documentation to document CCC 8024302: Clarify jar verifications
    - S8028090: reverting change - changeset pushed with incorrect commit message, linked to wrong issue
    - S8028111: XML readers share the same entity expansion counter
    - S8028215: ORB.init fails with SecurityException if properties select the JDK default ORB
    - S8028293: Check local configuration for actual ephemeral port range
    - S8028382: Two javax/xml/8005433 tests still fail after the fix JDK-8028147
    - S8028453: AsynchronousSocketChannel.connect() requires SocketPermission due to bind to local address (win)
    - S8028823: java/net/Makefile tabs converted to spaces
    - S8029038: Revise fix for XML readers share the same entity expansion counter
    - S8029842: Increment hsx 24.51 build to b03 for 7u51-b11
  * Bug fixes
    - Fix accidental reversion of PR1188 for armel
    - PR1781: NSS PKCS11 provider fails to handle multipart AES encryption
    - PR1830: Drop version requirement for LCMS 2
    - PR1833, RH1022017: Report elliptic curves supported by NSS, not the SunEC library
    - RH905128: [CRASH] OpenJDK-1.7.0 while using NSS security provider and kerberos
    - PR1393: JPEG support in build is broken on non-system-libjpeg builds
    - PR1726: configure fails looking for ecj.jar before even trying to find javac
    - Red Hat local: Fix for repo with path statting with / .
    - Remove unused hgforest script
    - PR1101: Undefined symbols on GNU/Linux SPARC
    - PR1659: OpenJDK 7 returns incorrect TrueType font metrics when bold style is set
    - PR1677, G498288: Update PaX support to detect running PaX kernel and use newer tools
    - PR1679: Allow OpenJDK to build on PaX-enabled kernels
    - PR1684: Build fails with empty PAX_COMMAND
    - RH1015432: java-1.7.0-openjdk: Fails on PPC with StackOverflowError (revised fix)
    - Link against $(LIBDL) if SYSTEM_CUPS is not true
    - Perform configure checks using ecj.jar when --with-gcj (native ecj build) is enabled.
    - Fix broken bootstrap build by updating ecj-multicatch.patch
    - PR1653: Support ppc64le via Zero
    - PR1654: ppc32 needs a larger ThreadStackSize to build
    - RH1015432: java-1.7.0-openjdk: Fails on PPC with StackOverflowError
    - RH910107: fail to load PC/SC library
  * ARM32 port
    - Add arm_port from IcedTea 6
    - Add patches/arm.patch from IcedTea 6
    - Add patches/arm-debug.patch from IcedTea 6
    - Add patches/arm-hsdis.patch from IcedTea 6
    - added jvmti event generation for dynamic_generate and compiled_method_load events to ARM JIT compiler
    - Adjust saved SP when safepointing.
    - First cut of invokedynamic
    - Fix trashed thread ptr after recursive re-entry from asm JIT.
    - JIT-compilation of ldc methodHandle
    - Rename a bunch of misleadingly-named functions
    - Changes for HSX22
    - Rename a bunch of misleadingly-named functions
    - Patched method handle adapter code to deal with failures in TCK
    - Phase 1
    - Phase 2
    - RTC Thumb2 JIT enhancements.
    - Zero fails to build in hsx22+, fix for hsx22 after runs gamma OK, hsx23 still nogo.
    - Use ldrexd for atomic reads on ARMv7.
    - Use unified syntax for thumb code.
    - Corrected call from fast_method_handle_entry to CppInterpreter::method_handle_entry so that thread is loaded into r2
    - Don't save locals at a return.
    - Fix call to handle_special_method().  Fix compareAndSwapLong.
    - Fix JIT bug that miscompiles org.eclipse.ui.internal.contexts.ContextAuthority.sourceChanged
    - invokedynamic and aldc for JIT
    - Modified safepoint check to rely on memory protect signal instead of polling
    - Minor review cleanups.
    - PR1188: ASM Interpreter and Thumb2 JIT javac miscompile modulo reminder on armel
    - PR1363: Fedora 19 / rawhide FTBFS SIGILL
    - Changes for HSX23
    - Remove fragment from method that has been removed
    - Remove C++ flags from CC_COMPILE and fix usage in zeroshark.make.
    - Use $(CC) to compile mkbc instead of $(CC_COMPILE) to avoid C++-only flags
    - Add note about use of $(CFLAGS)/$(CXXFLAGS)/$(CPPFLAGS) at present.
    - Override automatic detection of source language for bytecodes_arm.def
    - Include $(CFLAGS) in assembler stage
    - PR1626: ARM32 assembler update for hsx24. Use ARM32JIT to turn it on/off.
    - Replace literal offsets for METHOD_SIZEOFPARAMETERS and ISTATE_NEXT_FRAME with correct symbolic names.
    - Turn ARM32 JIT on by default
  * AArch64 port
    - AArch64 C2 instruct for smull
    - Add a constructor as a conversion from Register - RegSet.  Use it.
    - Add RegSet::operator+=.
    - Add support for a few simple intrinsics
    - Add support for builtin crc32 instructions
    - Add support for CRC32 intrinsic
    - Add support for Neon implementation of CRC32
    - All address constants are 48 bits in size.
    - C1: Fix offset overflow when profiling.
    - Common frame handling for C1/C2 which correctly handle all frame sizes
    - Correct costs for operations with shifts.
    - Correct OptoAssembly for prologs and epilogs.
    - Delete useless instruction.
    - Don't use any form of _call_VM_leaf when we're calling a stub.
    - Fast string comparison
    - Fast String.equals()
    - Fix a tonne of bogus comments.
    - Fix biased locking and enable as default
    - Fix instruction size from 8 to 4
    - Fix opto assembly for shifts.
    - Fix register misuse in verify_method_data_pointer
    - Fix register usage in generate_verify_oop().
    - Implement various locked memory operations.
    - Improve C1 performance improvements in ic_cache checks
    - Improve code generation for pop(), as suggested by Edward Nevill.
    - Improvements to safepoint polling
    - Make code entry alignment 64 for C2
    - Minor optimisation for divide by 2
    - New cost model for instruction selection.
    - Offsets in lookupswitch instructions should be signed.
    - Optimise addressing of card table byte map base
    - Optimise C2 entry point verification
    - Optimise long divide by 2
    - Performance improvement and ease of use changes pulled from upstream
    - Preserve callee save FP registers around call to java code
    - Remove obsolete C1 patching code.
    - Remove special-case handling of division arguments.  AArch64 doesn't need it.
    - Remove unnecessary memory barriers around CAS operations
    - Restore sp from sender sp, r13 in crc32 code
    - Restrict default ReservedCodeCacheSize to 128M
    - Rewrite CAS operations to be more conservative
    - Save intermediate state before removing C1 patching code.
    - Tidy up register usage in push/pop instructions.
    - Tidy up stack frame handling.
    - Use 2- and 3-instruction immediate form of movoop and mov_metadata in C2-generated code.
    - Use an explicit set of registers rather than a bitmap for psh and pop operations.
    - Use explicit barrier instructions in C1.
    - Use gcc __clear_cache instead of doing it ourselves
    - PR1713: Support AArch64 Port
  * Shark
    - Add Shark definitions from 8003868
    - Drop compile_method argument removed in 7083786 from sharkCompiler.cpp
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102739" comment="java-1_7_0-openjdk-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102740" comment="java-1_7_0-openjdk-accessibility-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102741" comment="java-1_7_0-openjdk-demo-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102742" comment="java-1_7_0-openjdk-devel-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102743" comment="java-1_7_0-openjdk-headless-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102744" comment="java-1_7_0-openjdk-javadoc-1.7.0.55-8.36.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102745" comment="java-1_7_0-openjdk-src-1.7.0.55-8.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:448" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This MozillaFirefox update fixes several security and non security issues.

Changes in MozillaFirefox:
- update to Firefox 34.0.5 (bnc#908009)
  * Default search engine changed to Yahoo! for North America
  * Default search engine changed to Yandex for Belarusian, Kazakh,
    and Russian locales
  * Improved search bar (en-US only)
  * Firefox Hello real-time communication client
  * Easily switch themes/personas directly in the Customizing mode
  * Implementation of HTTP/2 (draft14) and ALPN
  * Disabled SSLv3
  * MFSA 2014-83/CVE-2014-1587/CVE-2014-1588
    Miscellaneous memory safety hazards
  * MFSA 2014-84/CVE-2014-1589 (bmo#1043787)
    XBL bindings accessible via improper CSS declarations
  * MFSA 2014-85/CVE-2014-1590 (bmo#1087633)
    XMLHttpRequest crashes with some input streams
  * MFSA 2014-86/CVE-2014-1591 (bmo#1069762)
    CSP leaks redirect data via violation reports
  * MFSA 2014-87/CVE-2014-1592 (bmo#1088635)
    Use-after-free during HTML5 parsing
  * MFSA 2014-88/CVE-2014-1593 (bmo#1085175)
    Buffer overflow while parsing media content
  * MFSA 2014-89/CVE-2014-1594 (bmo#1074280)
    Bad casting from the BasicThebesLayer to BasicContainerLayer
- rebased patches
- limit linker memory usage for %ix86

- update to Firefox 33.1
  * Adding DuckDuckGo as a search option (upstream)
  * Forget Button added
  * Enhanced Tiles
  * Privacy tour introduced
- fix typo in GStreamer Recommends

- Disable elf-hack for aarch64
- Enable EGL for aarch64
- Limit RAM usage during link for %arm
- Fix _constraints for ARM

- use proper macros for ARM

- use '--disable-optimize' not only on 32-bit x86, but on 32-bit arm too
  to fix compiling.
- pass '-Wl,--no-keep-memory' to linker to reduce required memory during
  linking on arm.

- update to Firefox 33.0.2
  * Fix a startup crash with some combination of hardware and drivers
  33.0.1
  * Firefox displays a black screen at start-up with certain
    graphics drivers
- adjusted _constraints for ARM

- added mozilla-bmo1088588.patch to fix build with EGL (bmo#1088588)

- define /usr/share/myspell as additional dictionary location
  and remove add-plugins.sh finally (bnc#900639)

- use Firefox default optimization flags instead of -Os
- specfile cleanup
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102508" comment="MozillaFirefox-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102509" comment="MozillaFirefox-branding-upstream-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102510" comment="MozillaFirefox-buildsymbols-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102511" comment="MozillaFirefox-devel-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102512" comment="MozillaFirefox-translations-common-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102513" comment="MozillaFirefox-translations-other-34.0.5-1.94.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102514" comment="mozilla-nspr-32bit-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102515" comment="mozilla-nspr-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102516" comment="mozilla-nspr-devel-4.10.7-1.37.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102517" comment="libfreebl3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102518" comment="libfreebl3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102519" comment="libsoftokn3-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102520" comment="libsoftokn3-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102521" comment="mozilla-nss-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102522" comment="mozilla-nss-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102523" comment="mozilla-nss-certs-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102524" comment="mozilla-nss-certs-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102525" comment="mozilla-nss-devel-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102526" comment="mozilla-nss-sysinit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102527" comment="mozilla-nss-sysinit-32bit-3.17.2-1.63.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102528" comment="mozilla-nss-tools-3.17.2-1.63.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:449" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This MozillaThunderbird update fixes several security and non security
issues:

Changes in MozillaThunderbird:
- update to Thunderbird 31.3.0 (bnc#908009)
  * MFSA 2014-83/CVE-2014-1587
    Miscellaneous memory safety hazards
  * MFSA 2014-85/CVE-2014-1590 (bmo#1087633)
    XMLHttpRequest crashes with some input streams
  * MFSA 2014-87/CVE-2014-1592 (bmo#1088635)
    Use-after-free during HTML5 parsing
  * MFSA 2014-88/CVE-2014-1593 (bmo#1085175)
    Buffer overflow while parsing media content
  * MFSA 2014-89/CVE-2014-1594 (bmo#1074280)
    Bad casting from the BasicThebesLayer to BasicContainerLayer

- fix bashism in mozilla.sh script

- Limit RAM usage during link for ARM

- remove add-plugins.sh and use /usr/share/myspell directly
  (bnc#900639)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102901" comment="MozillaThunderbird-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102902" comment="MozillaThunderbird-buildsymbols-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102903" comment="MozillaThunderbird-devel-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102904" comment="MozillaThunderbird-translations-common-31.3.0-61.67.3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102905" comment="MozillaThunderbird-translations-other-31.3.0-61.67.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:450" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo, libjpeg62-turbo</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This libjpeg update fixes several security and non security issues:

- bnc#906761: Passing special crafted jpeg file smashes stack 
  (CVE-2014-9092)
- bnc#771791: Fixed heap overflow		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102746" comment="libjpeg-turbo-1.2.1-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102747" comment="libjpeg8-32bit-8.0.2-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102748" comment="libjpeg8-8.0.2-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102749" comment="libjpeg8-devel-32bit-8.0.2-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102750" comment="libjpeg8-devel-8.0.2-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102751" comment="libjpeg62-32bit-62.0.0-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102752" comment="libjpeg62-62.0.0-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102753" comment="libjpeg62-devel-32bit-62.0.0-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102754" comment="libjpeg62-devel-62.0.0-19.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102755" comment="libjpeg62-turbo-1.2.1-19.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:451" version="1" class="patch">
	<metadata>
		<title>Security update for phpMyAdmin</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

phpMyAdmin on openSUSE 12.3 and 13.1 was updated to 4.1.14.8.
This update fixes one vulnerability.
- Security fixes:
  * PMASA-2014-17 (CVE-2014-9218, CWE-661 CWE-400) [boo#908363]
    http://www.phpmyadmin.net/home_page/security/PMASA-2014-17.php
    - sf#4611 [security] DOS attack with long passwords

phpMyAdmin on openSUSE 13.2 was updated to 4.2.13.1 (2014-12-03)
- Security fixes:
  * PMASA-2014-18 (CVE-2014-9219, CWE-661 CWE-79) [boo#908364]
    http://www.phpmyadmin.net/home_page/security/PMASA-2014-18.php
    - sf#4612 [security] XSS vulnerability in redirection mechanism
  * PMASA-2014-17 (CVE-2014-9218, CWE-661 CWE-400) [boo#908363]
    http://www.phpmyadmin.net/home_page/security/PMASA-2014-17.php
    - sf#4611 [security] DOS attack with long passwords
- Bugfixes:
  - sf#4604 Query history not being deleted
  - sf#4057 db/table query string parameters no longer work
  - sf#4605 Unseen messages in tracking
  - sf#4606 Tracking report export as SQL dump does not work
  - sf#4607 Syntax error during db_copy operation
  - sf#4608 SELECT permission issues with relations and restricted 
    access
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102756" comment="phpMyAdmin-4.1.14.8-1.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:452" version="1" class="patch">
	<metadata>
		<title>Security update for rrdtool</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

rrdtools was updated to add check to the imginfo format to prevent crash or code execution.
(bnc#828003, CVE-2013-2131.)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102757" comment="lua-rrdtool-1.4.7-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102758" comment="python-rrdtool-1.4.7-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102759" comment="rrdtool-1.4.7-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102760" comment="rrdtool-devel-1.4.7-8.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102761" comment="tcl-rrdtool-1.4.7-8.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:453" version="1" class="patch">
	<metadata>
		<title>Security update for mutt</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
mutt was updated to fix a security issue with a heap-based buffer overflow in mutt_substrdup() (CVE-2014-9116).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102762" comment="mutt-1.5.21-36.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:454" version="1" class="patch">
	<metadata>
		<title>Server crash caused by malformed network packet.</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

    Firebird server crashes when handling a malformed network packet.
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102763" comment="firebird-classic-2.5.2.26539-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102764" comment="libfbembed-devel-2.5.2.26539-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102765" comment="libfbembed2_5-2.5.2.26539-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102766" comment="firebird-2.5.2.26539-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102767" comment="firebird-32bit-2.5.2.26539-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102768" comment="firebird-devel-2.5.2.26539-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102769" comment="firebird-doc-2.5.2.26539-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102770" comment="firebird-superserver-2.5.2.26539-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102771" comment="libfbclient2-2.5.2.26539-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102772" comment="libfbclient2-32bit-2.5.2.26539-2.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102773" comment="libfbclient2-devel-2.5.2.26539-2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:455" version="1" class="patch">
	<metadata>
		<title>Security update for jasper</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
jasper was updated to fix one security issue.

This security issue was fixed:
- Heap overflows in libjasper (CVE-2014-9029).
  		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102774" comment="jasper-1.900.1-156.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102775" comment="libjasper-devel-1.900.1-156.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102776" comment="libjasper1-1.900.1-156.5.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102777" comment="libjasper1-32bit-1.900.1-156.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:456" version="1" class="patch">
	<metadata>
		<title>Security update for seamonkey</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
seamonkey was updated to version 2.31 to fix eight security issues.

These security issues were fixed:
- Miscellaneous memory safety hazards (CVE-2014-1587, CVE-2014-1588).
- XBL bindings accessible via improper CSS declarations (CVE-2014-1589).
- XMLHttpRequest crashes with some input streams (CVE-2014-1590).
- CSP leaks redirect data via violation reports (CVE-2014-1591).
- Use-after-free during HTML5 parsing (CVE-2014-1592).
- Buffer overflow while parsing media content (CVE-2014-1593).
- Bad casting from the BasicThebesLayer to BasicContainerLayer (CVE-2014-1594).

This non-security issue was fixed:
- define /usr/share/myspell as additional dictionary location and remove add-plugins.sh finally (bnc#900639).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102906" comment="seamonkey-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102907" comment="seamonkey-dom-inspector-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102908" comment="seamonkey-irc-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102909" comment="seamonkey-translations-common-2.31-1.65.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102910" comment="seamonkey-translations-other-2.31-1.65.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:457" version="1" class="patch">
	<metadata>
		<title>Security update for pdns-recursor</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This pdns-recursor version update fixes the following security issue 
and non secuirty issues.

Update to upstream release 3.6.2.
- boo#906583: Degraded service through queries to queries to specific
  domains (CVE-2014-8601)
- Fixed broken _localstatedir

Update to upstream release 3.6.1.
- gab14b4f: expedite servfail generation for ezdns-like
  failures (fully abort query resolving if we hit more than
  50 outqueries)
- g42025be: PowerDNS now polls the security status of a
  release at startup and periodically. More detail on this
  feature, and how to turn it off, can be found in Section 2,
  &amp;quot;Security polling&amp;quot;.
- g5027429: We did not transmit the right 'local' socket
  address to Lua for TCP/IP queries in the recursor. In
  addition, we would attempt to lookup a filedescriptor that
  wasn't there in an unlocked map which could conceivably
  lead to crashes. Closes t1828, thanks Winfried for
  reporting
- g752756c: Sync embedded yahttp copy. API: Replace HTTP
  Basic auth with static key in custom header
- g6fdd40d: add missing #include &amp;lt;pthread.h&amp;gt; to
  rec-channel.hh (this fixes building on OS X).
- sync permissions/ownership of home and config dir with the pdns
  package
- added systemd support for 12.3 and newer

Update to upstrean release 3.5.3.
- This is a bugfix and performance update to 3.5.2. It brings
  serious performance improvements for dual stack users.
  For all the details see
  http://doc.powerdns.com/html/changelog.html#changelog-recursor-3.5.3
- Remove patch (pdns-recursor-3.3_config.patch)
- Add patch (pdns-recursor-3.5.3_config.patch)

Update to upstrean release 3.5.2.
- Responses without the QR bit set now get matched up to an
  outstanding query, so that resolution can be aborted early
  instead of waiting for a timeout.
- The depth limiter changes in 3.5.1 broke some legal domains
  with lots of indirection.
- Slightly improved logging to aid debugging.

Update to upstream version 3.5.1.
- This is a stability and bugfix update to 3.5. It contains important
  fixes that improve operation for certain domains.
  This is a stability, security and bugfix update to 3.3/3.3.1. It
  contains important fixes for slightly broken domain names, which
  your users expect to work anyhow. For all details see
  http://doc.powerdns.com/html/changelog.html#changelog-recursor-3.5.1
- adapted patches:
  pdns-rec-lua52.patch
  pdns-recursor-3.5.1_config.patch
- fixed conditional for different lua versions
- started some basic support to build packages for non suse distros
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103109" comment="pdns-recursor-3.6.2-6.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:458" version="1" class="patch">
	<metadata>
		<title>Security update for libksba</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This libksba update fixes the following security issue:

- bnc#907074: buffer overflow in OID processing (CVE-2014-9087)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103110" comment="libksba-1.3.0-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103111" comment="libksba-devel-1.3.0-3.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103112" comment="libksba8-1.3.0-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:459" version="1" class="patch">
	<metadata>
		<title>Security update for mailx</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This mailx update fixes the following security issue:

bsc#909208: shell command injection via crafted email addresses
            (CVE-2004-2771, CVE-2014-7844)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103200" comment="mailx-12.5-9.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:460" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The openSUSE 12.3 kernel was updated to fix security issues:

This will be the final kernel update for openSUSE 13.2 during
its lifetime, which ends January 4th 2015.

CVE-2014-9322: A local privilege escalation in the x86_64 32bit
compatibility signal handling was fixed, which could be used by local
attackers to crash the machine or execute code.

CVE-2014-9090: The do_double_fault function in arch/x86/kernel/traps.c
in the Linux kernel did not properly handle faults associated with the
Stack Segment (SS) segment register, which allowed local users to cause
a denial of service (panic) via a modify_ldt system call, as demonstrated
by sigreturn_32 in the linux-clock-tests test suite.

CVE-2014-8133: Insufficient validation of TLS register usage could leak
information from the kernel stack to userspace.

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on 32-bit
x86 platforms, when syscall auditing is enabled and the sep CPU feature
flag is set, allowed local users to cause a denial of service (OOPS
and system crash) via an invalid syscall number, as demonstrated by
number 1000.

CVE-2014-8884: Stack-based buffer overflow in the
ttusbdecfe_dvbs_diseqc_send_master_cmd function in
drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel allowed
local users to cause a denial of service (system crash) or possibly gain
privileges via a large message length in an ioctl call.

CVE-2014-3186: Buffer overflow in the picolcd_raw_event function in
devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the
Linux kernel, as used in Android on Nexus 7 devices, allowed physically
proximate attackers to cause a denial of service (system crash) or
possibly execute arbitrary code via a crafted device that sends a
large report.

CVE-2014-7841: The sctp_process_param function in net/sctp/sm_make_chunk.c
in the SCTP implementation in the Linux kernel, when ASCONF is used,
allowed remote attackers to cause a denial of service (NULL pointer
dereference and system crash) via a malformed INIT chunk.

CVE-2014-4608: Multiple integer overflows in the lzo1x_decompress_safe
function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in
the Linux kernel allowed context-dependent attackers to cause a denial
of service (memory corruption) via a crafted Literal Run.

CVE-2014-8709: The ieee80211_fragment function in net/mac80211/tx.c
in the Linux kernel did not properly maintain a certain tail pointer,
which allowed remote attackers to obtain sensitive cleartext information
by reading packets.

CVE-2014-3185: Multiple buffer overflows in the command_port_read_callback
function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial
Driver in the Linux kernel allowed physically proximate attackers to
execute arbitrary code or cause a denial of service (memory corruption
and system crash) via a crafted device that provides a large amount of
(1) EHCI or (2) XHCI data associated with a bulk response.

CVE-2014-3184: The report_fixup functions in the HID subsystem in the
Linux kernel might have allowed physically proximate attackers to cause a
denial of service (out-of-bounds write) via a crafted device that provides
a small report descriptor, related to (1) drivers/hid/hid-cherry.c,
(2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4)
drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6)
drivers/hid/hid-sunplus.c.

CVE-2014-3182: Array index error in the logi_dj_raw_event function in
drivers/hid/hid-logitech-dj.c in the Linux kernel allowed physically
proximate attackers to execute arbitrary code or cause a denial of
service (invalid kfree) via a crafted device that provides a malformed
REPORT_TYPE_NOTIF_DEVICE_UNPAIRED value.

CVE-2014-3181: Multiple stack-based buffer overflows in the
magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the
Magic Mouse HID driver in the Linux kernel allowed physically proximate
attackers to cause a denial of service (system crash) or possibly execute
arbitrary code via a crafted device that provides a large amount of (1)
EHCI or (2) XHCI data associated with an event.

CVE-2014-7826: kernel/trace/trace_syscalls.c in the Linux kernel did
not properly handle private syscall numbers during use of the ftrace
subsystem, which allowed local users to gain privileges or cause a denial
of service (invalid pointer dereference) via a crafted application.

CVE-2013-7263: The Linux kernel updated certain length values before
ensuring that associated data structures have been initialized,
which allowed local users to obtain sensitive information from kernel
stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system
call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c,
net/ipv6/raw.c, and net/ipv6/udp.c.
This update fixes the leak of the port number when using ipv6 sockets.
(bsc#853040).

CVE-2014-6410: The __udf_read_inode function in fs/udf/inode.c in the
Linux kernel did not restrict the amount of ICB indirection, which allowed
physically proximate attackers to cause a denial of service (infinite
loop or stack consumption) via a UDF filesystem with a crafted inode.

CVE-2014-5471: Stack consumption vulnerability in the
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux
kernel allowed local users to cause a denial of service (uncontrolled
recursion, and system crash or reboot) via a crafted iso9660 image with
a CL entry referring to a directory entry that has a CL entry.

CVE-2014-5472: The parse_rock_ridge_inode_internal function in
fs/isofs/rock.c in the Linux kernel allowed local users to cause a denial
of service (unkillable mount process) via a crafted iso9660 image with
a self-referential CL entry.

CVE-2014-4508: arch/x86/kernel/entry_32.S in the Linux kernel on 32-bit
x86 platforms, when syscall auditing is enabled and the sep CPU feature
flag is set, allowed local users to cause a denial of service (OOPS
and system crash) via an invalid syscall number, as demonstrated by
number 1000.

CVE-2014-4943: The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux
kernel allowed local users to gain privileges by leveraging data-structure
differences between an l2tp socket and an inet socket.

CVE-2014-5077: The sctp_assoc_update function in net/sctp/associola.c in
the Linux kernel, when SCTP authentication is enabled, allowed remote
attackers to cause a denial of service (NULL pointer dereference and
OOPS) by starting to establish an association between two endpoints
immediately after an exchange of INIT and INIT ACK chunks to establish
an earlier association between these endpoints in the opposite direction.

CVE-2014-4171: mm/shmem.c in the Linux kernel did not properly implement
the interaction between range notification and hole punching, which
allowed local users to cause a denial of service (i_mutex hold) by using
the mmap system call to access a hole, as demonstrated by interfering
with intended shmem activity by blocking completion of (1) an MADV_REMOVE
madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.



CVE-2013-2888, CVE-2013-2889, CVE-2013-2890, CVE-2013-2891, CVE-2013-2892,
CVE-2013-2893, CVE-2013-2894, CVE-2013-2895, CVE-2013-2896, CVE-2013-2897,
CVE-2013-2898, CVE-2013-2899:
Multiple issues in the Human Interface Device (HID) subsystem in the Linux
kernel allowed physically proximate attackers to cause a denial of service
or system crash via (heap-based out-of-bounds write) via a crafted device.
(Not seperately listed.)

Other bugfixes:
- xfs: mark all internal workqueues as freezable (bnc#899785).

- target/rd: Refactor rd_build_device_space + rd_release_device_space
  (bnc#882639)

- Enable CONFIG_ATH9K_HTC for armv7hl/omap2plus config (bnc#890624)

- swiotlb: don't assume PA 0 is invalid (bnc#865882).

- drm/i915: Apply alignment restrictions on scanout surfaces
  for VT-d (bnc#818561).

- tg3: Change nvram command timeout value to 50ms (bnc#768714).
- tg3: Override clock, link aware and link idle mode during
  NVRAM dump (bnc#768714).
- tg3: Set the MAC clock to the fastest speed during boot code
  load (bnc#768714).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102941" comment="kernel-debug-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102942" comment="kernel-debug-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102943" comment="kernel-debug-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102944" comment="kernel-default-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102945" comment="kernel-default-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102946" comment="kernel-default-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102947" comment="kernel-desktop-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102948" comment="kernel-desktop-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102949" comment="kernel-desktop-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102950" comment="kernel-docs-3.7.10-1.45.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102951" comment="kernel-ec2-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102952" comment="kernel-ec2-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102953" comment="kernel-ec2-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102954" comment="kernel-pae-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102955" comment="kernel-pae-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102956" comment="kernel-pae-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102957" comment="kernel-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102958" comment="kernel-source-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102959" comment="kernel-source-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102960" comment="kernel-syms-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102961" comment="kernel-trace-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102962" comment="kernel-trace-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102963" comment="kernel-trace-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102964" comment="kernel-vanilla-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102965" comment="kernel-vanilla-devel-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102966" comment="kernel-xen-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102967" comment="kernel-xen-base-3.7.10-1.45.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102968" comment="kernel-xen-devel-3.7.10-1.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:461" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This X.Org update fixes the following security and non security issues:

- Add and update security patches. (bnc#907268, CVE-2014-8091,
  CVE-2014-8092, CVE-2014-8093, CVE-2014-8094, CVE-2014-8095,
  CVE-2014-8096, CVE-2014-8097, CVE-2014-8098, CVE-2014-8099,
  CVE-2014-8100, CVE-2014-8101, CVE-2014-8102, CVE-2014-8103)
  http://lists.x.org/archives/xorg-announce/2014-December/002501.html
- Fixes rendering of some icewm and xfwm themes. (bnc#908258, bnc#856931)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103201" comment="xorg-x11-server-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103202" comment="xorg-x11-server-extra-7.6_1.13.2-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103203" comment="xorg-x11-server-sdk-7.6_1.13.2-1.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:462" version="1" class="patch">
	<metadata>
		<title>Security update for python3-rpm, rpm, rpm-python</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This rpm update fixes the following security and non security issues:

- honor --noglob in install mode [bnc#892431]
- check for bad invalid name sizes [bnc#908128] [CVE-2014-8118]
- create files with mode 0 [bnc#906803] [CVE-2013-6435]

This update also includes version updates of rpm-python and python3-rpm.
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103204" comment="python3-rpm-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103205" comment="rpm-python-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103206" comment="rpm-32bit-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103207" comment="rpm-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103208" comment="rpm-build-4.10.2-2.4.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103209" comment="rpm-devel-4.10.2-2.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:463" version="1" class="patch">
	<metadata>
		<title>Security update for subversion</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
This Apache Subversion update fixes the following security and non 
security issues.

- Apache Subversion 1.8.11
- This release addresses two security issues: [boo#909935]
  * CVE-2014-3580: mod_dav_svn DoS from invalid REPORT requests.
  * CVE-2014-8108: mod_dav_svn DoS from use of invalid transaction
    names.
- Client-side bugfixes:
  * checkout/update: fix file externals failing to follow history
    and subsequently silently failing
  * patch: don't skip targets in valid --git difs
  * diff: make property output in diffs stable
  * diff: fix diff of local copied directory with props
  * diff: fix changelist filter for repos-WC and WC-WC
  * remove broken conflict resolver menu options that always error
    out
  * improve gpg-agent support
  * fix crash in eclipse IDE with GNOME Keyring
  * fix externals shadowing a versioned directory
  * fix problems working on unix file systems that don't support
    permissions
  * upgrade: keep external registrations
  * cleanup: iprove performance of recorded timestamp fixups
  * translation updates for German
- Server-side bugfixes:
  * disable revprop caching feature due to cache invalidation
    problems
  * skip generating uniquifiers if rep-sharing is not supported
  * mod_dav_svn: reject requests with missing repository paths
  * mod_dav_svn: reject requests with invalid virtual transaction
    names
  * mod_dav_svn: avoid unneeded memory growth in resource walking
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103245" comment="libsvn_auth_gnome_keyring-1-0-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103246" comment="libsvn_auth_kwallet-1-0-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103247" comment="subversion-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103248" comment="subversion-bash-completion-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103249" comment="subversion-devel-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103250" comment="subversion-perl-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103251" comment="subversion-python-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103252" comment="subversion-server-1.7.19-2.40.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103253" comment="subversion-tools-1.7.19-2.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:464" version="1" class="patch">
	<metadata>
		<title>Security update for ntp</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

The network timeservice ntp was updated to fix critical security
issues (bnc#910764, CERT VU#852879)
* A potential remote code execution problem was found inside
  ntpd. The functions crypto_recv() (when using autokey
  authentication), ctl_putdata(), and configure() where updated
  to avoid buffer overflows that could be
  exploited. (CVE-2014-9295)
* Furthermore a problem inside the ntpd error handling was found
  that is missing a return statement. This could also lead to a
  potentially attack vector. (CVE-2014-9296)		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009102969" comment="ntp-4.2.6p5-9.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009102970" comment="ntp-doc-4.2.6p5-9.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:465" version="1" class="patch">
	<metadata>
		<title>Security update for apache2</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

Apache2 was updated to fix bugs and security issues.

Security issues fixed:
CVE-2013-5704: Added a change to fix a flaw in the way mod_headers handled chunked requests. Adds
&amp;quot;MergeTrailers&amp;quot; directive to restore legacy behavior [bnc#871310],

CVE-2014-8109: Fixes handling of the Require line when a LuaAuthzProvider
is used in multiple Require directives with different arguments.

Bugfixes:
- changed apache2.service file to fix situation where apache won't
  start at boot when using an encrypted certificate because user
  isn't prompted for password during boot [bnc#792309].
- added &amp;lt;IfModule&amp;gt; around SSLSessionCache to avoid failing to start
  [bnc#842377], [bnc#849445] and [bnc#864166].
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009103254" comment="apache2-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103255" comment="apache2-devel-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103256" comment="apache2-doc-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103257" comment="apache2-event-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103258" comment="apache2-example-pages-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103259" comment="apache2-itk-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103260" comment="apache2-prefork-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103261" comment="apache2-utils-2.2.29-10.20.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009103262" comment="apache2-worker-2.2.29-10.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:466" version="1" class="patch">
	<metadata>
		<title>Security update for libssh</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

      This update fixed the following security issue:
      - Fix CVE-2014-8132: Double free on dangling pointers in initial key exchange packet; (bsc#910790).
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105046" comment="libssh-0.5.3-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105047" comment="libssh-devel-0.5.3-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105048" comment="libssh-devel-doc-0.5.3-2.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105049" comment="libssh4-0.5.3-2.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:467" version="1" class="patch">
	<metadata>
		<title>Security update for jasper</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

   The follow issues were fixed with this update: 
      - CVE-2014-8137  double-free in jas_iccattrval_destroy()(bnc#909474)
      - CVE-2014-8138  heap overflow in jas_decode() (bnc#909475)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105095" comment="jasper-1.900.1-156.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105096" comment="libjasper-devel-1.900.1-156.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105097" comment="libjasper1-1.900.1-156.9.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105098" comment="libjasper1-32bit-1.900.1-156.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:468" version="1" class="patch">
	<metadata>
		<title>Security update for glibc</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>

This update for glibc fixes the following security issue:

CVE-2015-0235: A vulnerability was found and fixed in the GNU C Library,
specifically in the function gethostbyname(), that could lead to a local
or remote buffer overflow. (bsc#913646)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105683" comment="glibc-testsuite-2.17-4.17.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105684" comment="glibc-utils-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105685" comment="glibc-utils-32bit-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105686" comment="glibc-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105687" comment="glibc-devel-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105688" comment="glibc-devel-static-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105689" comment="glibc-extra-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105690" comment="glibc-html-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105691" comment="glibc-i18ndata-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105692" comment="glibc-info-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105693" comment="glibc-locale-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105694" comment="glibc-obsolete-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105695" comment="glibc-profile-2.17-4.17.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105696" comment="nscd-2.17-4.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:469" version="1" class="patch">
	<metadata>
		<title>update for MozillaFirefox, MozillaThunderbird, mozilla-nspr, mozilla-nss, seamonkey, xulrunner</title>
		<affected family="unix">
			<platform>openSUSE 12.3 Update</platform>
		</affected>
		<description>
Changes in seamonkey:
- update to SeaMonkey 2.20 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702
    Miscellaneous memory safety hazards
  * MFSA 2013-64/CVE-2013-1704 (bmo#883313)
    Use after free mutating DOM during SetBody
  * MFSA 2013-65/CVE-2013-1705 (bmo#882865)
    Buffer underflow when generating CRMF requests
  * MFSA 2013-67/CVE-2013-1708 (bmo#879924)
    Crash during WAV audio file decoding
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-70/CVE-2013-1711 (bmo#843829)
    Bypass of XrayWrappers using XBL Scopes
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system
- requires NSPR 4.10 and NSS 3.15
- removed obsolete seamonkey-shared-nss-db.patch

Changes in seamonkey:
- update to SeaMonkey 2.20 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702
    Miscellaneous memory safety hazards
  * MFSA 2013-64/CVE-2013-1704 (bmo#883313)
    Use after free mutating DOM during SetBody
  * MFSA 2013-65/CVE-2013-1705 (bmo#882865)
    Buffer underflow when generating CRMF requests
  * MFSA 2013-67/CVE-2013-1708 (bmo#879924)
    Crash during WAV audio file decoding
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-70/CVE-2013-1711 (bmo#843829)
    Bypass of XrayWrappers using XBL Scopes
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system
- requires NSPR 4.10 and NSS 3.15
- removed obsolete seamonkey-shared-nss-db.patch

Changes in xulrunner:
- update to 17.0.8esr (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701
    Miscellaneous memory safety hazards
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system

Changes in xulrunner:
- update to 17.0.8esr (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701
    Miscellaneous memory safety hazards
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system

Changes in MozillaThunderbird:
- update to Thunderbird 17.0.8 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701
    Miscellaneous memory safety hazards
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system

- update Enigmail to 1.5.2
  * bugfix release

Changes in MozillaThunderbird:
- update to Thunderbird 17.0.8 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701
    Miscellaneous memory safety hazards
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system

- update Enigmail to 1.5.2
  * bugfix release

Changes in mozilla-nss:
- fix 32bit requirement, it's without () actually

- update to 3.15.1
  * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites
    (RFC 5246 and RFC 5289) are supported, allowing TLS to be used
    without MD5 and SHA-1.
    Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF,
      which is always SHA-256 in NSS 3.15.1.
      AES GCM cipher suites are not yet supported.
  * some bugfixes and improvements

- require libnssckbi instead of mozilla-nss-certs so p11-kit can
  conflict with the latter (fate#314991)

- update to 3.15
  * Packaging
    + removed obsolete patches
      * nss-disable-expired-testcerts.patch
      * bug-834091.patch
  * New Functionality
    + Support for OCSP Stapling (RFC 6066, Certificate Status
      Request) has been added for both client and server sockets.
      TLS client applications may enable this via a call to
      SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
    + Added function SECITEM_ReallocItemV2. It replaces function
      SECITEM_ReallocItem, which is now declared as obsolete.
    + Support for single-operation (eg: not multi-part) symmetric
      key encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
    + certutil has been updated to support creating name constraints
      extensions.
  * New Functions
    in ssl.h
      SSL_PeerStapledOCSPResponse - Returns the server's stapled
        OCSP response, when used with a TLS client socket that
        negotiated the status_request extension.
      SSL_SetStapledOCSPResponses - Set's a stapled OCSP response
        for a TLS server socket to return when clients send the
        status_request extension.
    in ocsp.h
      CERT_PostOCSPRequest - Primarily intended for testing, permits
        the sending and receiving of raw OCSP request/responses.
    in secpkcs7.h
      SEC_PKCS7VerifyDetachedSignatureAtTime - Verifies a PKCS#7
        signature at a specific time other than the present time.
    in xconst.h
      CERT_EncodeNameConstraintsExtension - Matching function for
        CERT_DecodeNameConstraintsExtension, added in NSS 3.10.
    in secitem.h
      SECITEM_AllocArray
      SECITEM_DupArray
      SECITEM_FreeArray
      SECITEM_ZfreeArray - Utility functions to handle the
        allocation and deallocation of SECItemArrays
      SECITEM_ReallocItemV2 - Replaces SECITEM_ReallocItem, which is
        now obsolete. SECITEM_ReallocItemV2 better matches caller
        expectations, in that it updates item-&amp;gt;len on allocation.
        For more details of the issues with SECITEM_ReallocItem,
        see Bug 298649 and Bug 298938.
    in pk11pub.h
      PK11_Decrypt - Performs decryption as a single PKCS#11
        operation (eg: not multi-part). This is necessary for AES-GCM.
      PK11_Encrypt - Performs encryption as a single PKCS#11
        operation (eg: not multi-part). This is necessary for AES-GCM.
  * New Types
    in secitem.h
      SECItemArray - Represents a variable-length array of SECItems.
  * New Macros
    in ssl.h
      SSL_ENABLE_OCSP_STAPLING - Used with SSL_OptionSet to configure
        TLS client sockets to request the certificate_status extension
        (eg: OCSP stapling) when set to PR_TRUE
  * Notable changes
    + SECITEM_ReallocItem is now deprecated. Please consider using
      SECITEM_ReallocItemV2 in all future code.
    + The list of root CA certificates in the nssckbi module has
      been updated.
    + The default implementation of SSL_AuthCertificate has been
      updated to add certificate status responses stapled by the TLS
      server to the OCSP cache.
  * a lot of bugfixes

- Add Source URL, see https://en.opensuse.org/SourceUrls

Changes in mozilla-nss:
- fix 32bit requirement, it's without () actually

- update to 3.15.1
  * TLS 1.2 (RFC 5246) is supported. HMAC-SHA256 cipher suites
    (RFC 5246 and RFC 5289) are supported, allowing TLS to be used
    without MD5 and SHA-1.
    Note the following limitations:
      The hash function used in the signature for TLS 1.2 client
      authentication must be the hash function of the TLS 1.2 PRF,
      which is always SHA-256 in NSS 3.15.1.
      AES GCM cipher suites are not yet supported.
  * some bugfixes and improvements

- require libnssckbi instead of mozilla-nss-certs so p11-kit can
  conflict with the latter (fate#314991)

- update to 3.15
  * Packaging
    + removed obsolete patches
      * nss-disable-expired-testcerts.patch
      * bug-834091.patch
  * New Functionality
    + Support for OCSP Stapling (RFC 6066, Certificate Status
      Request) has been added for both client and server sockets.
      TLS client applications may enable this via a call to
      SSL_OptionSetDefault(SSL_ENABLE_OCSP_STAPLING, PR_TRUE);
    + Added function SECITEM_ReallocItemV2. It replaces function
      SECITEM_ReallocItem, which is now declared as obsolete.
    + Support for single-operation (eg: not multi-part) symmetric
      key encryption and decryption, via PK11_Encrypt and PK11_Decrypt.
    + certutil has been updated to support creating name constraints
      extensions.
  * New Functions
    in ssl.h
      SSL_PeerStapledOCSPResponse - Returns the server's stapled
        OCSP response, when used with a TLS client socket that
        negotiated the status_request extension.
      SSL_SetStapledOCSPResponses - Set's a stapled OCSP response
        for a TLS server socket to return when clients send the
        status_request extension.
    in ocsp.h
      CERT_PostOCSPRequest - Primarily intended for testing, permits
        the sending and receiving of raw OCSP request/responses.
    in secpkcs7.h
      SEC_PKCS7VerifyDetachedSignatureAtTime - Verifies a PKCS#7
        signature at a specific time other than the present time.
    in xconst.h
      CERT_EncodeNameConstraintsExtension - Matching function for
        CERT_DecodeNameConstraintsExtension, added in NSS 3.10.
    in secitem.h
      SECITEM_AllocArray
      SECITEM_DupArray
      SECITEM_FreeArray
      SECITEM_ZfreeArray - Utility functions to handle the
        allocation and deallocation of SECItemArrays
      SECITEM_ReallocItemV2 - Replaces SECITEM_ReallocItem, which is
        now obsolete. SECITEM_ReallocItemV2 better matches caller
        expectations, in that it updates item-&amp;gt;len on allocation.
        For more details of the issues with SECITEM_ReallocItem,
        see Bug 298649 and Bug 298938.
    in pk11pub.h
      PK11_Decrypt - Performs decryption as a single PKCS#11
        operation (eg: not multi-part). This is necessary for AES-GCM.
      PK11_Encrypt - Performs encryption as a single PKCS#11
        operation (eg: not multi-part). This is necessary for AES-GCM.
  * New Types
    in secitem.h
      SECItemArray - Represents a variable-length array of SECItems.
  * New Macros
    in ssl.h
      SSL_ENABLE_OCSP_STAPLING - Used with SSL_OptionSet to configure
        TLS client sockets to request the certificate_status extension
        (eg: OCSP stapling) when set to PR_TRUE
  * Notable changes
    + SECITEM_ReallocItem is now deprecated. Please consider using
      SECITEM_ReallocItemV2 in all future code.
    + The list of root CA certificates in the nssckbi module has
      been updated.
    + The default implementation of SSL_AuthCertificate has been
      updated to add certificate status responses stapled by the TLS
      server to the OCSP cache.
  * a lot of bugfixes

- Add Source URL, see https://en.opensuse.org/SourceUrls

Changes in mozilla-nspr:
- update to version 4.10
  * bmo#844513: Add AddressSanitizer (ASan) memory check annotations to
    PLArena.
  * bmo#849089: Simple changes to make NSPR's configure.in work with
    the current version of autoconf.
  * bmo#856196: Fix compiler warnings and clean up code in NSPR 4.10.
  * bmo#859066: Fix warning in nsprpub/pr/src/misc/prnetdb.c.
  * bmo#859830: Deprecate ANDROID_VERSION in favor of android/api-level.h.
  * bmo#861434: Make PR_SetThreadPriority() change priorities
    relatively to the main process instead of using absolute values on
    Linux.
  * bmo#871064L: _PR_InitThreads() should not call PR_SetThreadPriority.

Changes in mozilla-nspr:
- update to version 4.10
  * bmo#844513: Add AddressSanitizer (ASan) memory check annotations to
    PLArena.
  * bmo#849089: Simple changes to make NSPR's configure.in work with
    the current version of autoconf.
  * bmo#856196: Fix compiler warnings and clean up code in NSPR 4.10.
  * bmo#859066: Fix warning in nsprpub/pr/src/misc/prnetdb.c.
  * bmo#859830: Deprecate ANDROID_VERSION in favor of android/api-level.h.
  * bmo#861434: Make PR_SetThreadPriority() change priorities
    relatively to the main process instead of using absolute values on
    Linux.
  * bmo#871064L: _PR_InitThreads() should not call PR_SetThreadPriority.

Changes in MozillaFirefox:
- update to Firefox 23.0 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702
    Miscellaneous memory safety hazards
  * MFSA 2013-64/CVE-2013-1704 (bmo#883313)
    Use after free mutating DOM during SetBody
  * MFSA 2013-65/CVE-2013-1705 (bmo#882865)
    Buffer underflow when generating CRMF requests
  * MFSA 2013-67/CVE-2013-1708 (bmo#879924)
    Crash during WAV audio file decoding
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-70/CVE-2013-1711 (bmo#843829)
    Bypass of XrayWrappers using XBL Scopes
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system
- requires NSPR 4.10 and NSS 3.15

- fix build on ARM (/-g/ matches /-grecord-switches/)

Changes in MozillaFirefox:
- update to Firefox 23.0 (bnc#833389)
  * MFSA 2013-63/CVE-2013-1701/CVE-2013-1702
    Miscellaneous memory safety hazards
  * MFSA 2013-64/CVE-2013-1704 (bmo#883313)
    Use after free mutating DOM during SetBody
  * MFSA 2013-65/CVE-2013-1705 (bmo#882865)
    Buffer underflow when generating CRMF requests
  * MFSA 2013-67/CVE-2013-1708 (bmo#879924)
    Crash during WAV audio file decoding
  * MFSA 2013-68/CVE-2013-1709 (bmo#838253)
    Document URI misrepresentation and masquerading
  * MFSA 2013-69/CVE-2013-1710 (bmo#871368)
    CRMF requests allow for code execution and XSS attacks
  * MFSA 2013-70/CVE-2013-1711 (bmo#843829)
    Bypass of XrayWrappers using XBL Scopes
  * MFSA 2013-72/CVE-2013-1713 (bmo#887098)
    Wrong principal used for validating URI for some Javascript
    components
  * MFSA 2013-73/CVE-2013-1714 (bmo#879787)
    Same-origin bypass with web workers and XMLHttpRequest
  * MFSA 2013-75/CVE-2013-1717 (bmo#406541, bmo#738397)
    Local Java applets may read contents of local file system
- requires NSPR 4.10 and NSS 3.15

- fix build on ARM (/-g/ matches /-grecord-switches/)
		</description>
	</metadata>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009090154" comment="MozillaFirefox-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090155" comment="MozillaFirefox-branding-upstream-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090156" comment="MozillaFirefox-buildsymbols-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090159" comment="MozillaFirefox-devel-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090160" comment="MozillaFirefox-translations-common-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090161" comment="MozillaFirefox-translations-other-23.0-1.29.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090162" comment="MozillaThunderbird-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090163" comment="MozillaThunderbird-buildsymbols-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090166" comment="MozillaThunderbird-devel-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090168" comment="MozillaThunderbird-translations-common-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090169" comment="MozillaThunderbird-translations-other-17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090170" comment="enigmail-1.5.2+17.0.8-61.21.2 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090172" comment="mozilla-nspr-32bit-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090173" comment="mozilla-nspr-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090177" comment="mozilla-nspr-devel-4.10-1.14.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090178" comment="libfreebl3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090179" comment="libfreebl3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090182" comment="libsoftokn3-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090183" comment="libsoftokn3-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090186" comment="mozilla-nss-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090187" comment="mozilla-nss-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090188" comment="mozilla-nss-certs-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090189" comment="mozilla-nss-certs-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090195" comment="mozilla-nss-devel-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090196" comment="mozilla-nss-sysinit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090197" comment="mozilla-nss-sysinit-32bit-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090200" comment="mozilla-nss-tools-3.15.1-1.12.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090202" comment="seamonkey-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090205" comment="seamonkey-dom-inspector-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090206" comment="seamonkey-irc-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090207" comment="seamonkey-translations-common-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090208" comment="seamonkey-translations-other-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090209" comment="seamonkey-venkman-2.20-1.16.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090210" comment="mozilla-js-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090211" comment="mozilla-js-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090214" comment="xulrunner-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090215" comment="xulrunner-32bit-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090216" comment="xulrunner-buildsymbols-17.0.8-1.24.1 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009090220" comment="xulrunner-devel-17.0.8-1.24.1 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081493" version="1" comment="sudo is &lt;1.8.6p3-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081496" version="1" comment="sudo-devel is &lt;1.8.6p3-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081497" version="1" comment="firebird-classic is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081500" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081501" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081503" version="1" comment="firebird is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081504" version="1" comment="firebird-32bit is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081508" version="1" comment="firebird-devel is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081509" version="1" comment="firebird-doc is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081510" version="1" comment="firebird-superserver is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081512" version="1" comment="libfbclient2 is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081513" version="1" comment="libfbclient2-32bit is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081516" version="1" comment="libfbclient2-devel is &lt;2.5.2.26539-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081517" version="1" comment="wireshark is &lt;1.8.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081520" version="1" comment="wireshark-devel is &lt;1.8.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081521" version="1" comment="MozillaFirefox is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081522" version="1" comment="MozillaFirefox-branding-upstream is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081523" version="1" comment="MozillaFirefox-buildsymbols is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081526" version="1" comment="MozillaFirefox-devel is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081527" version="1" comment="MozillaFirefox-translations-common is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081528" version="1" comment="MozillaFirefox-translations-other is &lt;19.0.2-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081529" version="1" comment="krb5-doc is &lt;1.10.2-10.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081530" version="1" comment="krb5-mini is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081533" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081534" version="1" comment="krb5 is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081535" version="1" comment="krb5-32bit is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081536" version="1" comment="krb5-client is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081541" version="1" comment="krb5-devel is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081542" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081543" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081545" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081547" version="1" comment="krb5-server is &lt;1.10.2-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081549" version="1" comment="mozilla-js is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081550" version="1" comment="mozilla-js-32bit is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081553" version="1" comment="xulrunner is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081554" version="1" comment="xulrunner-32bit is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081555" version="1" comment="xulrunner-buildsymbols is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081559" version="1" comment="xulrunner-devel is &lt;17.0.4-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081561" version="1" comment="PackageKit is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081562" version="1" comment="PackageKit-backend-zypp is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081564" version="1" comment="PackageKit-branding-upstream is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081565" version="1" comment="PackageKit-browser-plugin is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081569" version="1" comment="PackageKit-devel is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081571" version="1" comment="PackageKit-gstreamer-plugin is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081573" version="1" comment="PackageKit-gtk3-module is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081575" version="1" comment="PackageKit-lang is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081576" version="1" comment="libpackagekit-glib2-16 is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081577" version="1" comment="libpackagekit-glib2-16-32bit is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081580" version="1" comment="libpackagekit-glib2-devel is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081581" version="1" comment="libpackagekit-glib2-devel-32bit is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081582" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081583" version="1" comment="typelib-1_0-PackageKitPlugin-1_0 is &lt;0.8.7-4.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081584" version="1" comment="seamonkey is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081587" version="1" comment="seamonkey-dom-inspector is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081588" version="1" comment="seamonkey-irc is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081589" version="1" comment="seamonkey-translations-common is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081590" version="1" comment="seamonkey-translations-other is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081591" version="1" comment="seamonkey-venkman is &lt;2.16.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081592" version="1" comment="perl-32bit is &lt;5.16.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081593" version="1" comment="perl is &lt;5.16.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081594" version="1" comment="perl-base-32bit is &lt;5.16.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081595" version="1" comment="perl-base is &lt;5.16.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081601" version="1" comment="perl-doc is &lt;5.16.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081602" version="1" comment="finch is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081604" version="1" comment="finch-devel is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081605" version="1" comment="libpurple is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081606" version="1" comment="libpurple-branding-upstream is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081608" version="1" comment="libpurple-devel is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081609" version="1" comment="libpurple-lang is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081610" version="1" comment="libpurple-meanwhile is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081612" version="1" comment="libpurple-tcl is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081614" version="1" comment="pidgin is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081617" version="1" comment="pidgin-devel is &lt;2.10.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081618" version="1" comment="openstack-cinder-doc is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081619" version="1" comment="openstack-cinder is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081620" version="1" comment="openstack-cinder-api is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081621" version="1" comment="openstack-cinder-scheduler is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081622" version="1" comment="openstack-cinder-test is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081623" version="1" comment="openstack-cinder-volume is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081624" version="1" comment="python-cinder is &lt;2012.2.4+git.1362502414.95a620b-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081625" version="1" comment="openstack-dashboard is &lt;2012.2.4+git.1362503968.8ece3c7-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081626" version="1" comment="openstack-dashboard-test is &lt;2012.2.4+git.1362503968.8ece3c7-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081627" version="1" comment="python-horizon is &lt;2012.2.4+git.1362503968.8ece3c7-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081628" version="1" comment="openstack-glance-doc is &lt;2012.2.4+git.1363297737.dd849a9-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081629" version="1" comment="openstack-glance is &lt;2012.2.4+git.1363297737.dd849a9-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081630" version="1" comment="openstack-glance-test is &lt;2012.2.4+git.1363297737.dd849a9-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081631" version="1" comment="python-glance is &lt;2012.2.4+git.1363297737.dd849a9-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081632" version="1" comment="openstack-keystone-doc is &lt;2012.2.4+git.1362502288.8690166-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081633" version="1" comment="openstack-keystone is &lt;2012.2.4+git.1362502288.8690166-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081634" version="1" comment="openstack-keystone-test is &lt;2012.2.4+git.1362502288.8690166-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081635" version="1" comment="python-keystone is &lt;2012.2.4+git.1362502288.8690166-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081636" version="1" comment="openstack-nova-doc is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081637" version="1" comment="openstack-nova is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081638" version="1" comment="openstack-nova-api is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081639" version="1" comment="openstack-nova-cert is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081640" version="1" comment="openstack-nova-compute is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081641" version="1" comment="openstack-nova-network is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081642" version="1" comment="openstack-nova-novncproxy is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081643" version="1" comment="openstack-nova-objectstore is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081644" version="1" comment="openstack-nova-scheduler is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081645" version="1" comment="openstack-nova-test is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081646" version="1" comment="openstack-nova-vncproxy is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081647" version="1" comment="openstack-nova-volume is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081648" version="1" comment="python-nova is &lt;2012.2.4+git.1363297910.9561484-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081649" version="1" comment="openstack-quantum is &lt;2012.2.4+git.1362583635.f94b149-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081650" version="1" comment="openstack-quantum-doc is &lt;2012.2.4+git.1362583635.f94b149-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081651" version="1" comment="openstack-quantum-test is &lt;2012.2.4+git.1362583635.f94b149-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081652" version="1" comment="python-quantum is &lt;2012.2.4+git.1362583635.f94b149-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081653" version="1" comment="openstack-quickstart is &lt;2012.2+git.1360262230.cb0fbe8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081654" version="1" comment="openstack-swift-doc is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081655" version="1" comment="openstack-swift is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081656" version="1" comment="openstack-swift-account is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081657" version="1" comment="openstack-swift-container is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081658" version="1" comment="openstack-swift-object is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081659" version="1" comment="openstack-swift-proxy is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081660" version="1" comment="openstack-swift-test is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081661" version="1" comment="python-swift is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081662" version="1" comment="python-cinderclient is &lt;1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081663" version="1" comment="python-cinderclient-doc is &lt;1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081664" version="1" comment="python-cinderclient-test is &lt;1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081665" version="1" comment="python-django_openstack_auth is &lt;1.0.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081666" version="1" comment="python-keystoneclient is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081667" version="1" comment="python-keystoneclient-doc is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081668" version="1" comment="python-keystoneclient-test is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081669" version="1" comment="MozillaThunderbird is &lt;17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081670" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081673" version="1" comment="MozillaThunderbird-devel is &lt;17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081675" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081676" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081677" version="1" comment="enigmail is &lt;1.5.1+17.0.4-61.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081679" version="1" comment="typo3-cms-4_5 is &lt;4.5.25-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081680" version="1" comment="typo3-cms-4_6 is &lt;4.6.18-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081681" version="1" comment="typo3-cms-4_7 is &lt;4.7.10-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081682" version="1" comment="nss-pam-ldapd is &lt;0.8.10-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081683" version="1" comment="nss-pam-ldapd-32bit is &lt;0.8.10-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081687" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081690" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081692" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081694" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081695" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081696" version="1" comment="telepathy-gabble is &lt;0.17.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081699" version="1" comment="telepathy-gabble-xmpp-console is &lt;0.17.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081701" version="1" comment="libxml2-2 is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081702" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081705" version="1" comment="libxml2 is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081707" version="1" comment="libxml2-devel is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081708" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081709" version="1" comment="libxml2-doc is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081710" version="1" comment="libxml2-tools is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081712" version="1" comment="python-libxml2 is &lt;2.9.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081715" version="1" comment="almanah is &lt;0.10.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081718" version="1" comment="almanah-lang is &lt;0.10.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079318" version="1" comment="privoxy is &lt;3.0.21-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009079321" version="1" comment="privoxy-doc is &lt;3.0.21-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081719" version="1" comment="ImageMagick is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081722" version="1" comment="ImageMagick-devel-32bit is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081723" version="1" comment="ImageMagick-devel is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081724" version="1" comment="ImageMagick-doc is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081725" version="1" comment="ImageMagick-extra is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081727" version="1" comment="libMagick++-devel is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081728" version="1" comment="libMagick++5 is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081730" version="1" comment="libMagickCore5-32bit is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081731" version="1" comment="libMagickCore5 is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081734" version="1" comment="libMagickWand5-32bit is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081735" version="1" comment="libMagickWand5 is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081738" version="1" comment="perl-PerlMagick is &lt;6.7.8.8-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081740" version="1" comment="GraphicsMagick is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081743" version="1" comment="GraphicsMagick-devel is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081744" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081745" version="1" comment="libGraphicsMagick++3 is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081747" version="1" comment="libGraphicsMagick3 is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081749" version="1" comment="libGraphicsMagickWand2 is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081751" version="1" comment="perl-GraphicsMagick is &lt;1.3.17-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081753" version="1" comment="pigz is &lt;2.2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081756" version="1" comment="libipa_hbac-devel is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081757" version="1" comment="libipa_hbac0 is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081759" version="1" comment="libsss_idmap-devel is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081760" version="1" comment="libsss_idmap0 is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081762" version="1" comment="libsss_sudo is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081764" version="1" comment="python-ipa_hbac is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081766" version="1" comment="python-sssd-config is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081768" version="1" comment="sssd is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081769" version="1" comment="sssd-32bit is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081773" version="1" comment="sssd-ipa-provider is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081775" version="1" comment="sssd-tools is &lt;1.9.4-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081777" version="1" comment="clamav is &lt;0.97.7-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081780" version="1" comment="openstack-keystone-doc is &lt;2012.2.4+git.1363796849.255b1d4-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081781" version="1" comment="openstack-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081782" version="1" comment="openstack-keystone-test is &lt;2012.2.4+git.1363796849.255b1d4-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081783" version="1" comment="python-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081784" version="1" comment="ruby is &lt;1.9.3-15.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081785" version="1" comment="ruby-devel is &lt;1.9.3-15.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081786" version="1" comment="ruby19 is &lt;1.9.3.p392-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081789" version="1" comment="ruby19-devel is &lt;1.9.3.p392-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081790" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081791" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081792" version="1" comment="ruby19-tk is &lt;1.9.3.p392-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081794" version="1" comment="fail2ban is &lt;0.8.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081795" version="1" comment="libxslt-python is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081798" version="1" comment="libxslt is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081800" version="1" comment="libxslt-devel is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081801" version="1" comment="libxslt-devel-32bit is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081802" version="1" comment="libxslt-tools is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081804" version="1" comment="libxslt1 is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081805" version="1" comment="libxslt1-32bit is &lt;1.1.28-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081808" version="1" comment="puppet is &lt;3.0.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081809" version="1" comment="puppet-server is &lt;3.0.2-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081810" version="1" comment="bind is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081811" version="1" comment="bind-chrootenv is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081814" version="1" comment="bind-devel is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081815" version="1" comment="bind-doc is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081816" version="1" comment="bind-libs-32bit is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081817" version="1" comment="bind-libs is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081820" version="1" comment="bind-lwresd is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081822" version="1" comment="bind-utils is &lt;9.9.2P2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081824" version="1" comment="dhcp is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081825" version="1" comment="dhcp-client is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081829" version="1" comment="dhcp-devel is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081830" version="1" comment="dhcp-doc is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081831" version="1" comment="dhcp-relay is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081833" version="1" comment="dhcp-server is &lt;4.2.5.P1-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081835" version="1" comment="jakarta-commons-httpclient is &lt;3.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081836" version="1" comment="jakarta-commons-httpclient-demo is &lt;3.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081837" version="1" comment="jakarta-commons-httpclient-javadoc is &lt;3.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081838" version="1" comment="jakarta-commons-httpclient-manual is &lt;3.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081839" version="1" comment="apache2 is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081842" version="1" comment="apache2-devel is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081843" version="1" comment="apache2-doc is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081844" version="1" comment="apache2-event is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081846" version="1" comment="apache2-example-pages is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081847" version="1" comment="apache2-itk is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081849" version="1" comment="apache2-prefork is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081851" version="1" comment="apache2-utils is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081853" version="1" comment="apache2-worker is &lt;2.2.22-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081855" version="1" comment="roundcubemail is &lt;0.8.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081856" version="1" comment="MozillaFirefox is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081857" version="1" comment="MozillaFirefox-branding-upstream is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081858" version="1" comment="MozillaFirefox-buildsymbols is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081861" version="1" comment="MozillaFirefox-devel is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081862" version="1" comment="MozillaFirefox-translations-common is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081863" version="1" comment="MozillaFirefox-translations-other is &lt;20.0-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081864" version="1" comment="MozillaThunderbird is &lt;17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081865" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081868" version="1" comment="MozillaThunderbird-devel is &lt;17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081870" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081871" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081872" version="1" comment="enigmail is &lt;1.5.1+17.0.5-61.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081874" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081875" version="1" comment="mozilla-nspr is &lt;4.9.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081879" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081880" version="1" comment="libfreebl3 is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081881" version="1" comment="libfreebl3-32bit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081884" version="1" comment="libsoftokn3 is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081885" version="1" comment="libsoftokn3-32bit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081888" version="1" comment="mozilla-nss is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081889" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081890" version="1" comment="mozilla-nss-certs is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081891" version="1" comment="mozilla-nss-certs-32bit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081897" version="1" comment="mozilla-nss-devel is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081898" version="1" comment="mozilla-nss-sysinit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081899" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081902" version="1" comment="mozilla-nss-tools is &lt;3.14.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081904" version="1" comment="mozilla-js is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081905" version="1" comment="mozilla-js-32bit is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081908" version="1" comment="xulrunner is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081909" version="1" comment="xulrunner-32bit is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081910" version="1" comment="xulrunner-buildsymbols is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081914" version="1" comment="xulrunner-devel is &lt;17.0.5-1.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081916" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081917" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081918" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081919" version="1" comment="rubygem-activerecord-3_2-doc is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081920" version="1" comment="libecpg6-32bit is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081921" version="1" comment="libecpg6 is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081924" version="1" comment="libpq5-32bit is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081925" version="1" comment="libpq5 is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081928" version="1" comment="postgresql92-devel is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081930" version="1" comment="postgresql92-libs is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081932" version="1" comment="postgresql92 is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081933" version="1" comment="postgresql92-contrib is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081937" version="1" comment="postgresql92-docs is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081938" version="1" comment="postgresql92-plperl is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081940" version="1" comment="postgresql92-plpython is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081942" version="1" comment="postgresql92-pltcl is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081944" version="1" comment="postgresql92-server is &lt;9.2.4-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081946" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081948" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081950" version="1" comment="subversion is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081951" version="1" comment="subversion-bash-completion is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081954" version="1" comment="subversion-devel is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081955" version="1" comment="subversion-perl is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081957" version="1" comment="subversion-python is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081959" version="1" comment="subversion-server is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081961" version="1" comment="subversion-tools is &lt;1.7.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081963" version="1" comment="seamonkey is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081966" version="1" comment="seamonkey-dom-inspector is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081967" version="1" comment="seamonkey-irc is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081968" version="1" comment="seamonkey-translations-common is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081969" version="1" comment="seamonkey-translations-other is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081970" version="1" comment="seamonkey-venkman is &lt;2.17-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081971" version="1" comment="curl is &lt;7.28.1-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081974" version="1" comment="libcurl-devel is &lt;7.28.1-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081975" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081976" version="1" comment="libcurl4 is &lt;7.28.1-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081979" version="1" comment="Mesa-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081980" version="1" comment="Mesa is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081984" version="1" comment="Mesa-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081985" version="1" comment="Mesa-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081986" version="1" comment="Mesa-libEGL-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081987" version="1" comment="Mesa-libEGL-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081988" version="1" comment="Mesa-libEGL1-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081989" version="1" comment="Mesa-libEGL1 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081992" version="1" comment="Mesa-libGL-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081993" version="1" comment="Mesa-libGL-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081994" version="1" comment="Mesa-libGL1-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081995" version="1" comment="Mesa-libGL1 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081998" version="1" comment="Mesa-libGLESv1_CM-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009081999" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082000" version="1" comment="Mesa-libGLESv1_CM1-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082001" version="1" comment="Mesa-libGLESv1_CM1 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082004" version="1" comment="Mesa-libGLESv2-2-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082005" version="1" comment="Mesa-libGLESv2-2 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082008" version="1" comment="Mesa-libGLESv2-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082009" version="1" comment="Mesa-libGLESv2-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082010" version="1" comment="Mesa-libIndirectGL-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082011" version="1" comment="Mesa-libIndirectGL-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082012" version="1" comment="Mesa-libIndirectGL1-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082013" version="1" comment="Mesa-libIndirectGL1 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082016" version="1" comment="Mesa-libglapi-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082017" version="1" comment="Mesa-libglapi-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082018" version="1" comment="Mesa-libglapi0-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082019" version="1" comment="Mesa-libglapi0 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082022" version="1" comment="libOSMesa-devel-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082023" version="1" comment="libOSMesa-devel is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082024" version="1" comment="libOSMesa9-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082025" version="1" comment="libOSMesa9 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082028" version="1" comment="libXvMC_nouveau-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082029" version="1" comment="libXvMC_nouveau is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082032" version="1" comment="libXvMC_r300-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082033" version="1" comment="libXvMC_r300 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082036" version="1" comment="libXvMC_r600-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082037" version="1" comment="libXvMC_r600 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082040" version="1" comment="libXvMC_softpipe-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082041" version="1" comment="libXvMC_softpipe is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082044" version="1" comment="libgbm-devel is &lt;0.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082045" version="1" comment="libgbm-devel-32bit is &lt;0.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082046" version="1" comment="libgbm1 is &lt;0.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082047" version="1" comment="libgbm1-32bit is &lt;0.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082050" version="1" comment="libvdpau_nouveau-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082051" version="1" comment="libvdpau_nouveau is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082054" version="1" comment="libvdpau_r300-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082055" version="1" comment="libvdpau_r300 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082058" version="1" comment="libvdpau_r600-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082059" version="1" comment="libvdpau_r600 is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082062" version="1" comment="libvdpau_softpipe-32bit is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082063" version="1" comment="libvdpau_softpipe is &lt;9.0.2-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082066" version="1" comment="libxatracker-devel is &lt;1.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082067" version="1" comment="libxatracker1 is &lt;1.0.0-34.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082069" version="1" comment="icedtea-web is &lt;1.3.2-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082072" version="1" comment="icedtea-web-javadoc is &lt;1.3.2-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082073" version="1" comment="kernel-debug is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082074" version="1" comment="kernel-debug-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082078" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082080" version="1" comment="kernel-default is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082081" version="1" comment="kernel-default-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082085" version="1" comment="kernel-default-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082087" version="1" comment="kernel-desktop is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082088" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082092" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082094" version="1" comment="kernel-docs is &lt;3.7.10-1.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082095" version="1" comment="kernel-ec2 is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082096" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082100" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082102" version="1" comment="kernel-pae is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082103" version="1" comment="kernel-pae-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082107" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082109" version="1" comment="kernel-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082110" version="1" comment="kernel-source is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082111" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082112" version="1" comment="kernel-syms is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082113" version="1" comment="kernel-trace is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082114" version="1" comment="kernel-trace-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082118" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082120" version="1" comment="kernel-vanilla is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082123" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082125" version="1" comment="kernel-xen is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082126" version="1" comment="kernel-xen-base is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082130" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082132" version="1" comment="libxml2-2 is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082133" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082136" version="1" comment="libxml2 is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082138" version="1" comment="libxml2-devel is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082139" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082140" version="1" comment="libxml2-doc is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082141" version="1" comment="libxml2-tools is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082143" version="1" comment="python-libxml2 is &lt;2.9.0-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082146" version="1" comment="krb5-doc is &lt;1.10.2-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082147" version="1" comment="krb5-mini is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082150" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082151" version="1" comment="krb5 is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082152" version="1" comment="krb5-32bit is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082153" version="1" comment="krb5-client is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082158" version="1" comment="krb5-devel is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082159" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082160" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082162" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082164" version="1" comment="krb5-server is &lt;1.10.2-10.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082166" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-8.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082169" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-8.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082171" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-8.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082173" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-8.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082174" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-8.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082175" version="1" comment="xorg-x11-server is &lt;7.6_1.13.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082178" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.13.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082180" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.13.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082181" version="1" comment="strongswan is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082183" version="1" comment="strongswan-doc is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082184" version="1" comment="strongswan-ipsec is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082186" version="1" comment="strongswan-libs0 is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082188" version="1" comment="strongswan-mysql is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082190" version="1" comment="strongswan-nm is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082192" version="1" comment="strongswan-sqlite is &lt;5.0.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082194" version="1" comment="python-httplib2 is &lt;0.7.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082195" version="1" comment="telepathy-idle is &lt;0.1.14-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082198" version="1" comment="openconnect is &lt;4.08-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082201" version="1" comment="openconnect-devel is &lt;4.08-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082202" version="1" comment="openconnect-doc is &lt;4.08-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082203" version="1" comment="openconnect-lang is &lt;4.08-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082204" version="1" comment="icedtea-web is &lt;1.4-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082207" version="1" comment="icedtea-web-javadoc is &lt;1.4-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082208" version="1" comment="clamav is &lt;0.97.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082211" version="1" comment="libtiff-devel-32bit is &lt;4.0.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082212" version="1" comment="libtiff-devel is &lt;4.0.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082213" version="1" comment="libtiff5-32bit is &lt;4.0.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082214" version="1" comment="libtiff5 is &lt;4.0.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082217" version="1" comment="tiff is &lt;4.0.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082220" version="1" comment="openstack-keystone-doc is &lt;2012.2.4+git.1363796849.255b1d4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082221" version="1" comment="openstack-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082222" version="1" comment="openstack-keystone-test is &lt;2012.2.4+git.1363796849.255b1d4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082223" version="1" comment="python-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082224" version="1" comment="samba-doc is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082225" version="1" comment="ldapsmb is &lt;1.34b-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082226" version="1" comment="libnetapi-devel is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082227" version="1" comment="libnetapi0 is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082229" version="1" comment="libsmbclient-devel is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082230" version="1" comment="libsmbclient0 is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082231" version="1" comment="libsmbclient0-32bit is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082234" version="1" comment="libsmbsharemodes-devel is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082235" version="1" comment="libsmbsharemodes0 is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082237" version="1" comment="libwbclient-devel is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082238" version="1" comment="libwbclient0 is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082239" version="1" comment="libwbclient0-32bit is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082242" version="1" comment="samba is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082243" version="1" comment="samba-32bit is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082244" version="1" comment="samba-client is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082245" version="1" comment="samba-client-32bit is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082251" version="1" comment="samba-devel is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082252" version="1" comment="samba-krb-printing is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082254" version="1" comment="samba-winbind is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082255" version="1" comment="samba-winbind-32bit is &lt;3.6.12-59.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082258" version="1" comment="MozillaFirefox-branding-openSUSE is &lt;21-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082259" version="1" comment="MozillaFirefox is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082260" version="1" comment="MozillaFirefox-branding-upstream is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082261" version="1" comment="MozillaFirefox-buildsymbols is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082264" version="1" comment="MozillaFirefox-devel is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082265" version="1" comment="MozillaFirefox-translations-common is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082266" version="1" comment="MozillaFirefox-translations-other is &lt;21.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082267" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082268" version="1" comment="mozilla-nspr is &lt;4.9.6-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082272" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082273" version="1" comment="MozillaThunderbird is &lt;17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082274" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082277" version="1" comment="MozillaThunderbird-devel is &lt;17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082279" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082280" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082281" version="1" comment="enigmail is &lt;1.5.1+17.0.6-61.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082283" version="1" comment="mozilla-js is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082284" version="1" comment="mozilla-js-32bit is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082287" version="1" comment="xulrunner is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082288" version="1" comment="xulrunner-32bit is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082289" version="1" comment="xulrunner-buildsymbols is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082293" version="1" comment="xulrunner-devel is &lt;17.0.6-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082295" version="1" comment="kernel-debug is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082296" version="1" comment="kernel-debug-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082300" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082302" version="1" comment="kernel-default is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082303" version="1" comment="kernel-default-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082307" version="1" comment="kernel-default-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082309" version="1" comment="kernel-desktop is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082310" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082314" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082316" version="1" comment="kernel-docs is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082317" version="1" comment="kernel-ec2 is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082318" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082322" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082324" version="1" comment="kernel-pae is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082325" version="1" comment="kernel-pae-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082329" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082331" version="1" comment="kernel-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082332" version="1" comment="kernel-source is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082333" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082334" version="1" comment="kernel-syms is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082335" version="1" comment="kernel-trace is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082336" version="1" comment="kernel-trace-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082340" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082342" version="1" comment="kernel-vanilla is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082345" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082347" version="1" comment="kernel-xen is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082348" version="1" comment="kernel-xen-base is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082352" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082354" version="1" comment="gpg2 is &lt;2.0.19-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082357" version="1" comment="gpg2-lang is &lt;2.0.19-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082358" version="1" comment="libvirt is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082359" version="1" comment="libvirt-client is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082360" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082365" version="1" comment="libvirt-devel is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082366" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082367" version="1" comment="libvirt-doc is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082368" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082370" version="1" comment="libvirt-python is &lt;1.0.2-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082372" version="1" comment="wireshark is &lt;1.8.7-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082375" version="1" comment="wireshark-devel is &lt;1.8.7-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082376" version="1" comment="nginx is &lt;1.2.9-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082379" version="1" comment="libxcb is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082380" version="1" comment="libxcb-composite0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082381" version="1" comment="libxcb-composite0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082384" version="1" comment="libxcb-damage0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082385" version="1" comment="libxcb-damage0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082389" version="1" comment="libxcb-devel is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082390" version="1" comment="libxcb-devel-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082391" version="1" comment="libxcb-dpms0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082392" version="1" comment="libxcb-dpms0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082395" version="1" comment="libxcb-dri2-0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082396" version="1" comment="libxcb-dri2-0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082399" version="1" comment="libxcb-glx0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082400" version="1" comment="libxcb-glx0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082403" version="1" comment="libxcb-randr0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082404" version="1" comment="libxcb-randr0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082407" version="1" comment="libxcb-record0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082408" version="1" comment="libxcb-record0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082411" version="1" comment="libxcb-render0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082412" version="1" comment="libxcb-render0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082415" version="1" comment="libxcb-res0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082416" version="1" comment="libxcb-res0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082419" version="1" comment="libxcb-screensaver0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082420" version="1" comment="libxcb-screensaver0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082423" version="1" comment="libxcb-shape0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082424" version="1" comment="libxcb-shape0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082427" version="1" comment="libxcb-shm0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082428" version="1" comment="libxcb-shm0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082431" version="1" comment="libxcb-sync0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082432" version="1" comment="libxcb-sync0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082435" version="1" comment="libxcb-xevie0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082436" version="1" comment="libxcb-xevie0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082439" version="1" comment="libxcb-xf86dri0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082440" version="1" comment="libxcb-xf86dri0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082443" version="1" comment="libxcb-xfixes0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082444" version="1" comment="libxcb-xfixes0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082447" version="1" comment="libxcb-xinerama0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082448" version="1" comment="libxcb-xinerama0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082451" version="1" comment="libxcb-xprint0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082452" version="1" comment="libxcb-xprint0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082455" version="1" comment="libxcb-xtest0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082456" version="1" comment="libxcb-xtest0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082459" version="1" comment="libxcb-xv0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082460" version="1" comment="libxcb-xv0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082463" version="1" comment="libxcb-xvmc0 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082464" version="1" comment="libxcb-xvmc0-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082467" version="1" comment="libxcb1 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082468" version="1" comment="libxcb1-32bit is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082471" version="1" comment="libXext is &lt;1.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082473" version="1" comment="libXext-devel is &lt;1.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082474" version="1" comment="libXext-devel-32bit is &lt;1.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082475" version="1" comment="libXext6 is &lt;1.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082476" version="1" comment="libXext6-32bit is &lt;1.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082479" version="1" comment="libXfixes is &lt;5.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082481" version="1" comment="libXfixes-devel-32bit is &lt;5.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082482" version="1" comment="libXfixes-devel is &lt;5.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082483" version="1" comment="libXfixes3-32bit is &lt;5.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082484" version="1" comment="libXfixes3 is &lt;5.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082487" version="1" comment="libXp is &lt;1.0.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082489" version="1" comment="libXp-devel is &lt;1.0.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082490" version="1" comment="libXp-devel-32bit is &lt;1.0.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082491" version="1" comment="libXp6 is &lt;1.0.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082492" version="1" comment="libXp6-32bit is &lt;1.0.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082495" version="1" comment="libXrender is &lt;0.9.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082497" version="1" comment="libXrender-devel is &lt;0.9.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082498" version="1" comment="libXrender-devel-32bit is &lt;0.9.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082499" version="1" comment="libXrender1 is &lt;0.9.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082500" version="1" comment="libXrender1-32bit is &lt;0.9.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082503" version="1" comment="libXt is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082505" version="1" comment="libXt-devel is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082506" version="1" comment="libXt-devel-32bit is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082507" version="1" comment="libXt6 is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082508" version="1" comment="libXt6-32bit is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082511" version="1" comment="libXv is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082513" version="1" comment="libXv-devel is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082514" version="1" comment="libXv-devel-32bit is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082515" version="1" comment="libXv1 is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082516" version="1" comment="libXv1-32bit is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082519" version="1" comment="telepathy-gabble is &lt;0.17.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082522" version="1" comment="telepathy-gabble-xmpp-console is &lt;0.17.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082524" version="1" comment="nfs-client is &lt;1.2.7-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082526" version="1" comment="nfs-doc is &lt;1.2.7-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082527" version="1" comment="nfs-kernel-server is &lt;1.2.7-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082529" version="1" comment="nfs-utils is &lt;1.2.7-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082531" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082533" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082535" version="1" comment="subversion is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082536" version="1" comment="subversion-bash-completion is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082539" version="1" comment="subversion-devel is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082540" version="1" comment="subversion-perl is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082542" version="1" comment="subversion-python is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082544" version="1" comment="subversion-server is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082546" version="1" comment="subversion-tools is &lt;1.7.10-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082548" version="1" comment="autotrace is &lt;0.31.1-637.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082551" version="1" comment="autotrace-devel is &lt;0.31.1-637.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082552" version="1" comment="libautotrace3 is &lt;0.31.1-637.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082554" version="1" comment="python-pymongo is &lt;2.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082557" version="1" comment="python3-pymongo is &lt;2.4.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082560" version="1" comment="kernel-debug is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082561" version="1" comment="kernel-debug-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082565" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082567" version="1" comment="kernel-default is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082568" version="1" comment="kernel-default-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082572" version="1" comment="kernel-default-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082574" version="1" comment="kernel-desktop is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082575" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082579" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082581" version="1" comment="kernel-docs is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082582" version="1" comment="kernel-ec2 is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082583" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082587" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082589" version="1" comment="kernel-pae is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082590" version="1" comment="kernel-pae-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082594" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082596" version="1" comment="kernel-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082597" version="1" comment="kernel-source is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082598" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082599" version="1" comment="kernel-syms is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082600" version="1" comment="kernel-trace is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082601" version="1" comment="kernel-trace-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082605" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082607" version="1" comment="kernel-vanilla is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082610" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082612" version="1" comment="kernel-xen is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082613" version="1" comment="kernel-xen-base is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082617" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082619" version="1" comment="libFS is &lt;1.0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082621" version="1" comment="libFS-devel is &lt;1.0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082622" version="1" comment="libFS-devel-32bit is &lt;1.0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082623" version="1" comment="libFS6 is &lt;1.0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082624" version="1" comment="libFS6-32bit is &lt;1.0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082627" version="1" comment="libXcursor is &lt;1.1.13-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082629" version="1" comment="libXcursor-devel is &lt;1.1.13-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082630" version="1" comment="libXcursor-devel-32bit is &lt;1.1.13-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082631" version="1" comment="libXcursor1 is &lt;1.1.13-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082632" version="1" comment="libXcursor1-32bit is &lt;1.1.13-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082635" version="1" comment="libXi is &lt;1.6.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082637" version="1" comment="libXi-devel is &lt;1.6.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082638" version="1" comment="libXi-devel-32bit is &lt;1.6.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082639" version="1" comment="libXi6 is &lt;1.6.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082640" version="1" comment="libXi6-32bit is &lt;1.6.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082643" version="1" comment="libXinerama is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082645" version="1" comment="libXinerama-devel is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082646" version="1" comment="libXinerama-devel-32bit is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082647" version="1" comment="libXinerama1 is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082648" version="1" comment="libXinerama1-32bit is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082651" version="1" comment="libXrandr is &lt;1.4.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082653" version="1" comment="libXrandr-devel is &lt;1.4.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082654" version="1" comment="libXrandr-devel-32bit is &lt;1.4.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082655" version="1" comment="libXrandr2 is &lt;1.4.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082656" version="1" comment="libXrandr2-32bit is &lt;1.4.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082659" version="1" comment="libXRes1 is &lt;1.0.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082660" version="1" comment="libXRes1-32bit is &lt;1.0.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082663" version="1" comment="libXres is &lt;1.0.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082665" version="1" comment="libXres-devel is &lt;1.0.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082666" version="1" comment="libXres-devel-32bit is &lt;1.0.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082667" version="1" comment="libXtst is &lt;1.2.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082669" version="1" comment="libXtst-devel is &lt;1.2.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082670" version="1" comment="libXtst-devel-32bit is &lt;1.2.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082671" version="1" comment="libXtst6 is &lt;1.2.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082672" version="1" comment="libXtst6-32bit is &lt;1.2.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082675" version="1" comment="libXvMC is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082677" version="1" comment="libXvMC-devel is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082678" version="1" comment="libXvMC-devel-32bit is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082679" version="1" comment="libXvMC1 is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082680" version="1" comment="libXvMC1-32bit is &lt;1.0.7-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082683" version="1" comment="libXxf86dga is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082685" version="1" comment="libXxf86dga-devel is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082686" version="1" comment="libXxf86dga-devel-32bit is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082687" version="1" comment="libXxf86dga1 is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082688" version="1" comment="libXxf86dga1-32bit is &lt;1.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082691" version="1" comment="libXxf86vm is &lt;1.1.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082693" version="1" comment="libXxf86vm-devel is &lt;1.1.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082694" version="1" comment="libXxf86vm-devel-32bit is &lt;1.1.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082695" version="1" comment="libXxf86vm1 is &lt;1.1.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082696" version="1" comment="libXxf86vm1-32bit is &lt;1.1.2-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082699" version="1" comment="libdmx is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082701" version="1" comment="libdmx-devel is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082702" version="1" comment="libdmx-devel-32bit is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082703" version="1" comment="libdmx1 is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082704" version="1" comment="libdmx1-32bit is &lt;1.1.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082707" version="1" comment="libX11 is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082708" version="1" comment="libX11-6 is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082709" version="1" comment="libX11-6-32bit is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082712" version="1" comment="libX11-data is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082714" version="1" comment="libX11-devel is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082715" version="1" comment="libX11-devel-32bit is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082716" version="1" comment="libX11-xcb1 is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082717" version="1" comment="libX11-xcb1-32bit is &lt;1.5.0-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082720" version="1" comment="darktable is &lt;1.1.3-1.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082723" version="1" comment="darktable-doc is &lt;1.1.3-1.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082724" version="1" comment="darktable is &lt;1.1.3-1.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082727" version="1" comment="darktable-doc is &lt;1.1.3-1.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082728" version="1" comment="wireshark is &lt;1.8.8-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082731" version="1" comment="wireshark-devel is &lt;1.8.8-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082732" version="1" comment="phpMyAdmin is &lt;3.5.8.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082733" version="1" comment="libraw is &lt;0.14.7-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082735" version="1" comment="libraw-devel is &lt;0.14.7-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082736" version="1" comment="libraw-devel-static is &lt;0.14.7-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082737" version="1" comment="libraw-tools is &lt;0.14.7-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082739" version="1" comment="libraw5 is &lt;0.14.7-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082741" version="1" comment="libraw is &lt;0.14.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082743" version="1" comment="libraw-devel is &lt;0.14.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082744" version="1" comment="libraw-devel-static is &lt;0.14.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082745" version="1" comment="libraw-tools is &lt;0.14.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082747" version="1" comment="libraw5 is &lt;0.14.7-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082749" version="1" comment="openstack-nova-doc is &lt;2012.2.4+git.1363297910.9561484-2.10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082750" version="1" comment="openstack-nova is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082751" version="1" comment="openstack-nova-api is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082752" version="1" comment="openstack-nova-cert is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082753" version="1" comment="openstack-nova-compute is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082754" version="1" comment="openstack-nova-network is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082755" version="1" comment="openstack-nova-novncproxy is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082756" version="1" comment="openstack-nova-objectstore is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082757" version="1" comment="openstack-nova-scheduler is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082758" version="1" comment="openstack-nova-test is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082759" version="1" comment="openstack-nova-vncproxy is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082760" version="1" comment="openstack-nova-volume is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082761" version="1" comment="python-nova is &lt;2012.2.4+git.1363297910.9561484-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082762" version="1" comment="python-greenlet is &lt;0.4.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082765" version="1" comment="python-greenlet-devel is &lt;0.4.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082766" version="1" comment="openstack-swift-doc is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082767" version="1" comment="openstack-swift is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082768" version="1" comment="openstack-swift-account is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082769" version="1" comment="openstack-swift-container is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082770" version="1" comment="openstack-swift-object is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082771" version="1" comment="openstack-swift-proxy is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082772" version="1" comment="openstack-swift-test is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082773" version="1" comment="python-swift is &lt;1.7.4.1+git.1359529903.0ce3e1d-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082774" version="1" comment="openstack-keystone-doc is &lt;2012.2.4+git.1363796849.255b1d4-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082775" version="1" comment="openstack-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082776" version="1" comment="openstack-keystone-test is &lt;2012.2.4+git.1363796849.255b1d4-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082777" version="1" comment="python-keystone is &lt;2012.2.4+git.1363796849.255b1d4-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082778" version="1" comment="python-keystoneclient is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082779" version="1" comment="python-keystoneclient-doc is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082780" version="1" comment="python-keystoneclient-test is &lt;0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082781" version="1" comment="fail2ban is &lt;0.8.8-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082782" version="1" comment="krb5-doc is &lt;1.10.2-10.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082783" version="1" comment="krb5-mini is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082786" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082787" version="1" comment="krb5 is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082788" version="1" comment="krb5-32bit is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082789" version="1" comment="krb5-client is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082794" version="1" comment="krb5-devel is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082795" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082796" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082798" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082800" version="1" comment="krb5-server is &lt;1.10.2-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082802" version="1" comment="dbus-1-x11 is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082805" version="1" comment="dbus-1 is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082806" version="1" comment="dbus-1-32bit is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082810" version="1" comment="dbus-1-devel is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082811" version="1" comment="dbus-1-devel-32bit is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082812" version="1" comment="dbus-1-devel-doc is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082813" version="1" comment="libdbus-1-3 is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082814" version="1" comment="libdbus-1-3-32bit is &lt;1.6.8-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082817" version="1" comment="xdm is &lt;1.1.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082820" version="1" comment="curl is &lt;7.28.1-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082823" version="1" comment="libcurl-devel is &lt;7.28.1-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082824" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082825" version="1" comment="libcurl4 is &lt;7.28.1-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082828" version="1" comment="MozillaFirefox is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082829" version="1" comment="MozillaFirefox-branding-upstream is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082830" version="1" comment="MozillaFirefox-buildsymbols is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082833" version="1" comment="MozillaFirefox-devel is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082834" version="1" comment="MozillaFirefox-translations-common is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082835" version="1" comment="MozillaFirefox-translations-other is &lt;22.0-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082836" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082837" version="1" comment="mozilla-nspr is &lt;4.9.6-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082841" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082842" version="1" comment="MozillaThunderbird is &lt;17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082843" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082846" version="1" comment="MozillaThunderbird-devel is &lt;17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082848" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082849" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082850" version="1" comment="enigmail is &lt;1.5.1+17.0.7-61.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082852" version="1" comment="mozilla-js is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082853" version="1" comment="mozilla-js-32bit is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082856" version="1" comment="xulrunner is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082857" version="1" comment="xulrunner-32bit is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082858" version="1" comment="xulrunner-buildsymbols is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082862" version="1" comment="xulrunner-devel is &lt;17.0.7-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082864" version="1" comment="xorg-x11-server is &lt;7.6_1.13.2-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082867" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.13.2-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082869" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.13.2-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082870" version="1" comment="python-bugzilla is &lt;0.6.2-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082871" version="1" comment="nagios is &lt;3.5.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082874" version="1" comment="nagios-devel is &lt;3.5.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082875" version="1" comment="nagios-www is &lt;3.5.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082876" version="1" comment="nagios-www-dch is &lt;3.5.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082878" version="1" comment="chromedriver is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082880" version="1" comment="chromium is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082883" version="1" comment="chromium-desktop-gnome is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082884" version="1" comment="chromium-desktop-kde is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082885" version="1" comment="chromium-ffmpegsumo is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082887" version="1" comment="chromium-suid-helper is &lt;30.0.1553.0-1.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082889" version="1" comment="ruby19 is &lt;1.9.3.p392-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082892" version="1" comment="ruby19-devel is &lt;1.9.3.p392-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082893" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082894" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082895" version="1" comment="ruby19-tk is &lt;1.9.3.p392-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082897" version="1" comment="perl-Module-Signature is &lt;0.73-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082898" version="1" comment="seamonkey is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082901" version="1" comment="seamonkey-dom-inspector is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082902" version="1" comment="seamonkey-irc is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082903" version="1" comment="seamonkey-translations-common is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082904" version="1" comment="seamonkey-translations-other is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082905" version="1" comment="seamonkey-venkman is &lt;2.19-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082906" version="1" comment="Mesa-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082907" version="1" comment="Mesa is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082911" version="1" comment="Mesa-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082912" version="1" comment="Mesa-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082913" version="1" comment="Mesa-libEGL-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082914" version="1" comment="Mesa-libEGL-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082915" version="1" comment="Mesa-libEGL1-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082916" version="1" comment="Mesa-libEGL1 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082919" version="1" comment="Mesa-libGL-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082920" version="1" comment="Mesa-libGL-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082921" version="1" comment="Mesa-libGL1-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082922" version="1" comment="Mesa-libGL1 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082925" version="1" comment="Mesa-libGLESv1_CM-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082926" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082927" version="1" comment="Mesa-libGLESv1_CM1-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082928" version="1" comment="Mesa-libGLESv1_CM1 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082931" version="1" comment="Mesa-libGLESv2-2-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082932" version="1" comment="Mesa-libGLESv2-2 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082935" version="1" comment="Mesa-libGLESv2-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082936" version="1" comment="Mesa-libGLESv2-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082937" version="1" comment="Mesa-libIndirectGL-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082938" version="1" comment="Mesa-libIndirectGL-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082939" version="1" comment="Mesa-libIndirectGL1-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082940" version="1" comment="Mesa-libIndirectGL1 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082943" version="1" comment="Mesa-libglapi-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082944" version="1" comment="Mesa-libglapi-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082945" version="1" comment="Mesa-libglapi0-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082946" version="1" comment="Mesa-libglapi0 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082949" version="1" comment="libOSMesa-devel-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082950" version="1" comment="libOSMesa-devel is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082951" version="1" comment="libOSMesa9-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082952" version="1" comment="libOSMesa9 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082955" version="1" comment="libXvMC_nouveau-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082956" version="1" comment="libXvMC_nouveau is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082959" version="1" comment="libXvMC_r300-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082960" version="1" comment="libXvMC_r300 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082963" version="1" comment="libXvMC_r600-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082964" version="1" comment="libXvMC_r600 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082967" version="1" comment="libXvMC_softpipe-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082968" version="1" comment="libXvMC_softpipe is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082971" version="1" comment="libgbm-devel is &lt;0.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082972" version="1" comment="libgbm-devel-32bit is &lt;0.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082973" version="1" comment="libgbm1 is &lt;0.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082974" version="1" comment="libgbm1-32bit is &lt;0.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082977" version="1" comment="libvdpau_nouveau-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082978" version="1" comment="libvdpau_nouveau is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082981" version="1" comment="libvdpau_r300-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082982" version="1" comment="libvdpau_r300 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082985" version="1" comment="libvdpau_r600-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082986" version="1" comment="libvdpau_r600 is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082989" version="1" comment="libvdpau_softpipe-32bit is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082990" version="1" comment="libvdpau_softpipe is &lt;9.0.2-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082993" version="1" comment="libxatracker-devel is &lt;1.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082994" version="1" comment="libxatracker1 is &lt;1.0.0-34.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082996" version="1" comment="python-suds is &lt;0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009082997" version="1" comment="qemu is &lt;1.3.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083000" version="1" comment="qemu-guest-agent is &lt;1.3.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083002" version="1" comment="qemu-linux-user is &lt;1.3.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083004" version="1" comment="qemu-tools is &lt;1.3.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083006" version="1" comment="tinyproxy is &lt;1.8.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083009" version="1" comment="cgit is &lt;0.9.1-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080476" version="1" comment="python-django is &lt;1.4.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083012" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083015" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083017" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083019" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083020" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083021" version="1" comment="libxml2-2 is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083022" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083025" version="1" comment="libxml2 is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083027" version="1" comment="libxml2-devel is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083028" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083029" version="1" comment="libxml2-doc is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083030" version="1" comment="libxml2-tools is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083032" version="1" comment="python-libxml2 is &lt;2.9.0-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083035" version="1" comment="nagstamon is &lt;0.9.10-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083036" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083038" version="1" comment="php5 is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083039" version="1" comment="php5-bcmath is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083041" version="1" comment="php5-bz2 is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083043" version="1" comment="php5-calendar is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083045" version="1" comment="php5-ctype is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083047" version="1" comment="php5-curl is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083049" version="1" comment="php5-dba is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083053" version="1" comment="php5-devel is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083054" version="1" comment="php5-dom is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083056" version="1" comment="php5-enchant is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083058" version="1" comment="php5-exif is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083060" version="1" comment="php5-fastcgi is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083062" version="1" comment="php5-fileinfo is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083064" version="1" comment="php5-fpm is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083066" version="1" comment="php5-ftp is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083068" version="1" comment="php5-gd is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083070" version="1" comment="php5-gettext is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083072" version="1" comment="php5-gmp is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083074" version="1" comment="php5-iconv is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083076" version="1" comment="php5-imap is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083078" version="1" comment="php5-intl is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083080" version="1" comment="php5-json is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083082" version="1" comment="php5-ldap is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083084" version="1" comment="php5-mbstring is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083086" version="1" comment="php5-mcrypt is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083088" version="1" comment="php5-mssql is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083090" version="1" comment="php5-mysql is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083092" version="1" comment="php5-odbc is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083094" version="1" comment="php5-openssl is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083096" version="1" comment="php5-pcntl is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083098" version="1" comment="php5-pdo is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083100" version="1" comment="php5-pear is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083101" version="1" comment="php5-pgsql is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083103" version="1" comment="php5-phar is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083105" version="1" comment="php5-posix is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083107" version="1" comment="php5-pspell is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083109" version="1" comment="php5-readline is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083111" version="1" comment="php5-shmop is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083113" version="1" comment="php5-snmp is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083115" version="1" comment="php5-soap is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083117" version="1" comment="php5-sockets is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083119" version="1" comment="php5-sqlite is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083121" version="1" comment="php5-suhosin is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083123" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083125" version="1" comment="php5-sysvsem is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083127" version="1" comment="php5-sysvshm is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083129" version="1" comment="php5-tidy is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083131" version="1" comment="php5-tokenizer is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083133" version="1" comment="php5-wddx is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083135" version="1" comment="php5-xmlreader is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083137" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083139" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083141" version="1" comment="php5-xsl is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083143" version="1" comment="php5-zip is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083145" version="1" comment="php5-zlib is &lt;5.3.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083147" version="1" comment="kde4-kgreeter-plugins is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083149" version="1" comment="kdebase4-workspace is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083150" version="1" comment="kdebase4-workspace-branding-upstream is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083153" version="1" comment="kdebase4-workspace-devel is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083155" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083157" version="1" comment="kdebase4-workspace-liboxygenstyle-32bit is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083158" version="1" comment="kdebase4-workspace-liboxygenstyle is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083161" version="1" comment="kdebase4-workspace-plasma-calendar is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083163" version="1" comment="kdm is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083164" version="1" comment="kdm-branding-upstream is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083166" version="1" comment="kwin is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083168" version="1" comment="python-kdebase4 is &lt;4.10.5-1.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080612" version="1" comment="lcms2 is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080615" version="1" comment="liblcms2-2 is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080616" version="1" comment="liblcms2-2-32bit is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080619" version="1" comment="liblcms2-devel is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080620" version="1" comment="liblcms2-devel-32bit is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009080621" version="1" comment="liblcms2-doc is &lt;2.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083169" version="1" comment="libsrtp1 is &lt;1.4.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083171" version="1" comment="srtp is &lt;1.4.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083173" version="1" comment="srtp-devel is &lt;1.4.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083174" version="1" comment="file-roller is &lt;3.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083177" version="1" comment="file-roller-lang is &lt;3.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083178" version="1" comment="nautilus-file-roller is &lt;3.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083180" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083182" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083184" version="1" comment="subversion is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083185" version="1" comment="subversion-bash-completion is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083188" version="1" comment="subversion-devel is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083189" version="1" comment="subversion-perl is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083191" version="1" comment="subversion-python is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083193" version="1" comment="subversion-server is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083195" version="1" comment="subversion-tools is &lt;1.7.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090978" version="1" comment="tomcat is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090979" version="1" comment="tomcat-admin-webapps is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090980" version="1" comment="tomcat-docs-webapp is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090981" version="1" comment="tomcat-el-2_2-api is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090982" version="1" comment="tomcat-javadoc is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090983" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090984" version="1" comment="tomcat-jsvc is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090985" version="1" comment="tomcat-lib is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090986" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090987" version="1" comment="tomcat-webapps is &lt;7.0.35-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083207" version="1" comment="libgcrypt is &lt;1.5.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083209" version="1" comment="libgcrypt-devel is &lt;1.5.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083210" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083213" version="1" comment="libgcrypt11 is &lt;1.5.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083214" version="1" comment="libgcrypt11-32bit is &lt;1.5.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083217" version="1" comment="wireshark is &lt;1.8.9-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083220" version="1" comment="wireshark-devel is &lt;1.8.9-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089965" version="1" comment="apache2 is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089968" version="1" comment="apache2-devel is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089969" version="1" comment="apache2-doc is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089970" version="1" comment="apache2-event is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089972" version="1" comment="apache2-example-pages is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089973" version="1" comment="apache2-itk is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089975" version="1" comment="apache2-prefork is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089977" version="1" comment="apache2-utils is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089979" version="1" comment="apache2-worker is &lt;2.2.22-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089981" version="1" comment="otrs is &lt;3.1.18-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089982" version="1" comment="otrs-doc is &lt;3.1.18-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089983" version="1" comment="otrs-itsm is &lt;3.1.10-26.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089984" version="1" comment="apache2-mod_security2 is &lt;2.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089987" version="1" comment="libmysqlclient-devel is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089988" version="1" comment="libmysqlclient18-32bit is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089989" version="1" comment="libmysqlclient18 is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089992" version="1" comment="libmysqlclient_r18-32bit is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089993" version="1" comment="libmysqlclient_r18 is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089994" version="1" comment="libmysqld-devel is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089995" version="1" comment="libmysqld18 is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089997" version="1" comment="mariadb is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089998" version="1" comment="mariadb-bench is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090000" version="1" comment="mariadb-client is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090002" version="1" comment="mariadb-debug-version is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090006" version="1" comment="mariadb-errormessages is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090007" version="1" comment="mariadb-test is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090009" version="1" comment="mariadb-tools is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090011" version="1" comment="libmysql55client18-32bit is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090012" version="1" comment="libmysql55client18 is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090015" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090016" version="1" comment="libmysql55client_r18 is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090017" version="1" comment="mysql-community-server is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090018" version="1" comment="mysql-community-server-bench is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090020" version="1" comment="mysql-community-server-client is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090022" version="1" comment="mysql-community-server-debug-version is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090026" version="1" comment="mysql-community-server-errormessages is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090027" version="1" comment="mysql-community-server-test is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090029" version="1" comment="mysql-community-server-tools is &lt;5.5.32-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090031" version="1" comment="strongswan is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090033" version="1" comment="strongswan-doc is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090034" version="1" comment="strongswan-ipsec is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090036" version="1" comment="strongswan-libs0 is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090038" version="1" comment="strongswan-mysql is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090040" version="1" comment="strongswan-nm is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090042" version="1" comment="strongswan-sqlite is &lt;5.0.1-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090044" version="1" comment="python-glanceclient is &lt;0.6.0.14.gc057fe4+git.1355912586.c057fe4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090045" version="1" comment="python-glanceclient-test is &lt;0.6.0.14.gc057fe4+git.1355912586.c057fe4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090121" version="1" comment="samba-doc is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090122" version="1" comment="libnetapi-devel is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090123" version="1" comment="libnetapi0 is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090125" version="1" comment="libsmbclient-devel is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090126" version="1" comment="libsmbclient0 is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090127" version="1" comment="libsmbclient0-32bit is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090130" version="1" comment="libsmbsharemodes-devel is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090131" version="1" comment="libsmbsharemodes0 is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090133" version="1" comment="libwbclient-devel is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090134" version="1" comment="libwbclient0 is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090135" version="1" comment="libwbclient0-32bit is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090138" version="1" comment="samba is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090139" version="1" comment="samba-32bit is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090140" version="1" comment="samba-client is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090141" version="1" comment="samba-client-32bit is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090147" version="1" comment="samba-devel is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090148" version="1" comment="samba-krb-printing is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090150" version="1" comment="samba-winbind is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090151" version="1" comment="samba-winbind-32bit is &lt;3.6.12-59.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090390" version="1" comment="libzypp is &lt;12.15.0-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090393" version="1" comment="libzypp-devel is &lt;12.15.0-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090046" version="1" comment="phpMyAdmin is &lt;4.0.5-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090154" version="1" comment="MozillaFirefox is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090155" version="1" comment="MozillaFirefox-branding-upstream is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090156" version="1" comment="MozillaFirefox-buildsymbols is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090159" version="1" comment="MozillaFirefox-devel is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090160" version="1" comment="MozillaFirefox-translations-common is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090161" version="1" comment="MozillaFirefox-translations-other is &lt;23.0-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090162" version="1" comment="MozillaThunderbird is &lt;17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090163" version="1" comment="MozillaThunderbird-buildsymbols is &lt;17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090166" version="1" comment="MozillaThunderbird-devel is &lt;17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090168" version="1" comment="MozillaThunderbird-translations-common is &lt;17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090169" version="1" comment="MozillaThunderbird-translations-other is &lt;17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090170" version="1" comment="enigmail is &lt;1.5.2+17.0.8-61.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090172" version="1" comment="mozilla-nspr-32bit is &lt;4.10-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090173" version="1" comment="mozilla-nspr is &lt;4.10-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090177" version="1" comment="mozilla-nspr-devel is &lt;4.10-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090178" version="1" comment="libfreebl3 is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090179" version="1" comment="libfreebl3-32bit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090182" version="1" comment="libsoftokn3 is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090183" version="1" comment="libsoftokn3-32bit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090186" version="1" comment="mozilla-nss is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090187" version="1" comment="mozilla-nss-32bit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090188" version="1" comment="mozilla-nss-certs is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090189" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090195" version="1" comment="mozilla-nss-devel is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090196" version="1" comment="mozilla-nss-sysinit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090197" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090200" version="1" comment="mozilla-nss-tools is &lt;3.15.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090202" version="1" comment="seamonkey is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090205" version="1" comment="seamonkey-dom-inspector is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090206" version="1" comment="seamonkey-irc is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090207" version="1" comment="seamonkey-translations-common is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090208" version="1" comment="seamonkey-translations-other is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090209" version="1" comment="seamonkey-venkman is &lt;2.20-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090210" version="1" comment="mozilla-js is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090211" version="1" comment="mozilla-js-32bit is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090214" version="1" comment="xulrunner is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090215" version="1" comment="xulrunner-32bit is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090216" version="1" comment="xulrunner-buildsymbols is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090220" version="1" comment="xulrunner-devel is &lt;17.0.8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090245" version="1" comment="bind is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090246" version="1" comment="bind-chrootenv is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090249" version="1" comment="bind-devel is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090250" version="1" comment="bind-doc is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090251" version="1" comment="bind-libs-32bit is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090252" version="1" comment="bind-libs is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090255" version="1" comment="bind-lwresd is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090257" version="1" comment="bind-utils is &lt;9.9.3P2-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090222" version="1" comment="filezilla is &lt;3.7.3-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090225" version="1" comment="filezilla-lang is &lt;3.7.3-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090259" version="1" comment="putty is &lt;0.63-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090291" version="1" comment="puppet is &lt;3.0.2-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090292" version="1" comment="puppet-server is &lt;3.0.2-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090306" version="1" comment="cacti is &lt;0.8.8b-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090351" version="1" comment="ruby is &lt;1.9.3-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090352" version="1" comment="ruby-devel is &lt;1.9.3-15.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090353" version="1" comment="xen is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090355" version="1" comment="xen-devel is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090356" version="1" comment="xen-kmp-default is &lt;4.2.2_06_k3.7.10_1.16-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090358" version="1" comment="xen-kmp-desktop is &lt;4.2.2_06_k3.7.10_1.16-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090360" version="1" comment="xen-kmp-pae is &lt;4.2.2_06_k3.7.10_1.16-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090362" version="1" comment="xen-libs-32bit is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090363" version="1" comment="xen-libs is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090366" version="1" comment="xen-tools-domU is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090368" version="1" comment="xen-doc-html is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090369" version="1" comment="xen-doc-pdf is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090370" version="1" comment="xen-tools is &lt;4.2.2_06-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090385" version="1" comment="roundcubemail is &lt;0.9.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090472" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090473" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090476" version="1" comment="python-base is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090477" version="1" comment="python-base-32bit is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090481" version="1" comment="python-devel is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090482" version="1" comment="python-xml is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090484" version="1" comment="python-doc is &lt;2.7-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090485" version="1" comment="python-doc-pdf is &lt;2.7-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090486" version="1" comment="python is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090487" version="1" comment="python-32bit is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090488" version="1" comment="python-curses is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090493" version="1" comment="python-demo is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090494" version="1" comment="python-gdbm is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090496" version="1" comment="python-idle is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090497" version="1" comment="python-tk is &lt;2.7.3-10.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090499" version="1" comment="libpython3_3m1_0 is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090500" version="1" comment="libpython3_3m1_0-32bit is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090503" version="1" comment="python3-base is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090504" version="1" comment="python3-base-32bit is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090508" version="1" comment="python3-devel is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090510" version="1" comment="python3-idle is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090511" version="1" comment="python3-testsuite is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090513" version="1" comment="python3-tools is &lt;3.3.0-6.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090514" version="1" comment="python3-doc is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090515" version="1" comment="python3-doc-pdf is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090516" version="1" comment="python3 is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090517" version="1" comment="python3-32bit is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090518" version="1" comment="python3-curses is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090520" version="1" comment="python3-dbm is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090525" version="1" comment="python3-tk is &lt;3.3.0-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090527" version="1" comment="squid is &lt;3.2.11-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090530" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090532" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090534" version="1" comment="subversion is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090535" version="1" comment="subversion-bash-completion is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090538" version="1" comment="subversion-devel is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090539" version="1" comment="subversion-perl is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090541" version="1" comment="subversion-python is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090543" version="1" comment="subversion-server is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090545" version="1" comment="subversion-tools is &lt;1.7.13-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090703" version="1" comment="wireshark is &lt;1.8.10-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090706" version="1" comment="wireshark-devel is &lt;1.8.10-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090707" version="1" comment="libtiff-devel-32bit is &lt;4.0.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090708" version="1" comment="libtiff-devel is &lt;4.0.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090709" version="1" comment="libtiff5-32bit is &lt;4.0.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090710" version="1" comment="libtiff5 is &lt;4.0.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090713" version="1" comment="tiff is &lt;4.0.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090760" version="1" comment="gpg2 is &lt;2.0.19-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090763" version="1" comment="gpg2-lang is &lt;2.0.19-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090723" version="1" comment="mozilla-js is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090724" version="1" comment="mozilla-js-32bit is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090727" version="1" comment="xulrunner is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090728" version="1" comment="xulrunner-32bit is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090729" version="1" comment="xulrunner-buildsymbols is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090733" version="1" comment="xulrunner-devel is &lt;17.0.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090764" version="1" comment="MozillaFirefox is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090765" version="1" comment="MozillaFirefox-branding-upstream is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090766" version="1" comment="MozillaFirefox-buildsymbols is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090769" version="1" comment="MozillaFirefox-devel is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090770" version="1" comment="MozillaFirefox-translations-common is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090771" version="1" comment="MozillaFirefox-translations-other is &lt;24.0-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090772" version="1" comment="MozillaThunderbird is &lt;24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090773" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090776" version="1" comment="MozillaThunderbird-devel is &lt;24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090777" version="1" comment="MozillaThunderbird-translations-common is &lt;24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090778" version="1" comment="MozillaThunderbird-translations-other is &lt;24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090779" version="1" comment="enigmail is &lt;1.5.2+24.0-61.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090781" version="1" comment="seamonkey is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090784" version="1" comment="seamonkey-dom-inspector is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090785" version="1" comment="seamonkey-irc is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090786" version="1" comment="seamonkey-translations-common is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090787" version="1" comment="seamonkey-translations-other is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090788" version="1" comment="seamonkey-venkman is &lt;2.21-1.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090759" version="1" comment="python-django is &lt;1.4.8-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090880" version="1" comment="boost is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090881" version="1" comment="boost-devel is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090882" version="1" comment="boost-devel-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090883" version="1" comment="boost-doc-html is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090884" version="1" comment="boost-doc-man is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090885" version="1" comment="boost-doc-pdf is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090886" version="1" comment="boost-license1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090887" version="1" comment="libboost_chrono1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090888" version="1" comment="libboost_date_time1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090889" version="1" comment="libboost_date_time1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090890" version="1" comment="libboost_filesystem1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090891" version="1" comment="libboost_filesystem1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090892" version="1" comment="libboost_graph1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090893" version="1" comment="libboost_graph1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090894" version="1" comment="libboost_iostreams1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090895" version="1" comment="libboost_iostreams1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090896" version="1" comment="libboost_locale1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090897" version="1" comment="libboost_math1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090898" version="1" comment="libboost_math1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090899" version="1" comment="libboost_mpi1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090900" version="1" comment="libboost_mpi1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090901" version="1" comment="libboost_program_options1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090902" version="1" comment="libboost_program_options1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090903" version="1" comment="libboost_python1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090904" version="1" comment="libboost_python1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090905" version="1" comment="libboost_random1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090906" version="1" comment="libboost_random1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090907" version="1" comment="libboost_regex1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090908" version="1" comment="libboost_regex1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090909" version="1" comment="libboost_serialization1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090910" version="1" comment="libboost_serialization1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090911" version="1" comment="libboost_signals1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090912" version="1" comment="libboost_signals1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090913" version="1" comment="libboost_system1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090914" version="1" comment="libboost_system1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090915" version="1" comment="libboost_test1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090916" version="1" comment="libboost_test1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090917" version="1" comment="libboost_thread1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090918" version="1" comment="libboost_thread1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090919" version="1" comment="libboost_timer1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090920" version="1" comment="libboost_wave1_49_0 is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090921" version="1" comment="libboost_wave1_49_0-32bit is &lt;1.49.0-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090796" version="1" comment="glibc-testsuite is &lt;2.17-4.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090797" version="1" comment="glibc-utils is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090798" version="1" comment="glibc-utils-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090802" version="1" comment="glibc is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090803" version="1" comment="glibc-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090807" version="1" comment="glibc-devel is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090808" version="1" comment="glibc-devel-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090811" version="1" comment="glibc-devel-static is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090812" version="1" comment="glibc-devel-static-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090813" version="1" comment="glibc-extra is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090815" version="1" comment="glibc-i18ndata is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090816" version="1" comment="glibc-info is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090817" version="1" comment="glibc-locale is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090818" version="1" comment="glibc-locale-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090821" version="1" comment="glibc-obsolete is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090823" version="1" comment="glibc-profile is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090824" version="1" comment="glibc-profile-32bit is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090825" version="1" comment="nscd is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090827" version="1" comment="glibc-html is &lt;2.17-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090828" version="1" comment="glibc-testsuite is &lt;2.17-4.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090930" version="1" comment="libudev-mini-devel is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090931" version="1" comment="libudev-mini1 is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090932" version="1" comment="systemd-mini is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090933" version="1" comment="systemd-mini-analyze is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090934" version="1" comment="systemd-mini-devel is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090935" version="1" comment="systemd-mini-sysvinit is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090936" version="1" comment="udev-mini is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090937" version="1" comment="libgudev-1_0-0 is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090938" version="1" comment="libgudev-1_0-0-32bit is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090939" version="1" comment="libgudev-1_0-devel is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090940" version="1" comment="libudev-devel is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090941" version="1" comment="libudev1 is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090942" version="1" comment="libudev1-32bit is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090943" version="1" comment="systemd is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090944" version="1" comment="systemd-32bit is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090945" version="1" comment="systemd-analyze is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090946" version="1" comment="systemd-devel is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090947" version="1" comment="systemd-logger is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090948" version="1" comment="systemd-sysvinit is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090949" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090950" version="1" comment="udev is &lt;195-13.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090829" version="1" comment="icedtea-web is &lt;1.4.1-4.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090832" version="1" comment="icedtea-web-javadoc is &lt;1.4.1-4.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092480" version="1" comment="kernel-debug is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092481" version="1" comment="kernel-debug-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092482" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092483" version="1" comment="kernel-default is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092484" version="1" comment="kernel-default-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092485" version="1" comment="kernel-default-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092486" version="1" comment="kernel-desktop is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092487" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092488" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092489" version="1" comment="kernel-docs is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092490" version="1" comment="kernel-ec2 is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092491" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092492" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092493" version="1" comment="kernel-pae is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092494" version="1" comment="kernel-pae-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092495" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092496" version="1" comment="kernel-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092497" version="1" comment="kernel-source is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092498" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092499" version="1" comment="kernel-syms is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092500" version="1" comment="kernel-trace is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092501" version="1" comment="kernel-trace-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092502" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092503" version="1" comment="kernel-vanilla is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092504" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092505" version="1" comment="kernel-xen is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092506" version="1" comment="kernel-xen-base is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092507" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090988" version="1" comment="libfreebl3 is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090989" version="1" comment="libfreebl3-32bit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090990" version="1" comment="libsoftokn3 is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090991" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090992" version="1" comment="mozilla-nss is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090993" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090994" version="1" comment="mozilla-nss-certs is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090995" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090996" version="1" comment="mozilla-nss-devel is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090997" version="1" comment="mozilla-nss-sysinit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090998" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090999" version="1" comment="mozilla-nss-tools is &lt;3.15.2-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091015" version="1" comment="rtkit is &lt;0.11_git201205151338-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091000" version="1" comment="clutter is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091001" version="1" comment="clutter-devel is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091002" version="1" comment="clutter-lang is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091003" version="1" comment="libclutter-1_0-0 is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091004" version="1" comment="libclutter-1_0-0-32bit is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091005" version="1" comment="typelib-1_0-Clutter-1_0 is &lt;1.12.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091032" version="1" comment="libvirt is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091033" version="1" comment="libvirt-client is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091034" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091035" version="1" comment="libvirt-devel is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091036" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091037" version="1" comment="libvirt-doc is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091038" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091039" version="1" comment="libvirt-python is &lt;1.0.2-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091057" version="1" comment="chromedriver is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091058" version="1" comment="chromium is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091059" version="1" comment="chromium-desktop-gnome is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091060" version="1" comment="chromium-desktop-kde is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091061" version="1" comment="chromium-ffmpegsumo is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091062" version="1" comment="chromium-suid-helper is &lt;30.0.1599.66-1.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091016" version="1" comment="lcms is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091017" version="1" comment="liblcms-devel is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091018" version="1" comment="liblcms-devel-32bit is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091019" version="1" comment="liblcms1 is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091020" version="1" comment="liblcms1-32bit is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091021" version="1" comment="python-lcms is &lt;1.19-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091022" version="1" comment="gpg2 is &lt;2.0.19-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091023" version="1" comment="gpg2-lang is &lt;2.0.19-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091088" version="1" comment="proftpd is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091089" version="1" comment="proftpd-devel is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091090" version="1" comment="proftpd-doc is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091091" version="1" comment="proftpd-lang is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091092" version="1" comment="proftpd-ldap is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091093" version="1" comment="proftpd-mysql is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091094" version="1" comment="proftpd-pgsql is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091095" version="1" comment="proftpd-radius is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091096" version="1" comment="proftpd-sqlite is &lt;1.3.4d-4.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091097" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091098" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091099" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091100" version="1" comment="libspice-controller0 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091101" version="1" comment="python-SpiceClientGtk is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091102" version="1" comment="spice-gtk is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091103" version="1" comment="spice-gtk-devel is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091104" version="1" comment="spice-gtk-lang is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091105" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091106" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091107" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091063" version="1" comment="ncat is &lt;6.25-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091064" version="1" comment="ndiff is &lt;6.25-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091065" version="1" comment="nmap is &lt;6.25-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091066" version="1" comment="nping is &lt;6.25-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091067" version="1" comment="zenmap is &lt;6.25-3.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091110" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-114.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091111" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-114.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091122" version="1" comment="libzrtpcpp is &lt;2.0.0-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091123" version="1" comment="libzrtpcpp-devel is &lt;2.0.0-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091124" version="1" comment="libzrtpcpp2 is &lt;2.0.0-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091147" version="1" comment="dropbear is &lt;2013.60-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091135" version="1" comment="ruby19 is &lt;1.9.3.p392-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091136" version="1" comment="ruby19-devel is &lt;1.9.3.p392-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091137" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091138" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091139" version="1" comment="ruby19-tk is &lt;1.9.3.p392-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091140" version="1" comment="xorg-x11-server is &lt;7.6_1.13.2-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091141" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.13.2-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091142" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.13.2-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091143" version="1" comment="apache2-mod_fcgid is &lt;2.3.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091148" version="1" comment="hplip is &lt;3.12.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091149" version="1" comment="hplip-hpijs is &lt;3.12.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091150" version="1" comment="hplip-sane is &lt;3.12.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091348" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-8.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091349" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-8.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091350" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-8.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091351" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-8.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091352" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-8.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091252" version="1" comment="libmodplug is &lt;0.8.8.4-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091253" version="1" comment="libmodplug-devel is &lt;0.8.8.4-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091254" version="1" comment="libmodplug1 is &lt;0.8.8.4-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091255" version="1" comment="libmodplug1-32bit is &lt;0.8.8.4-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091207" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091208" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091209" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091210" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091211" version="1" comment="openssl is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091212" version="1" comment="openssl-doc is &lt;1.0.1e-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092255" version="1" comment="xen is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092256" version="1" comment="xen-devel is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092257" version="1" comment="xen-kmp-default is &lt;4.2.3_01_k3.7.10_1.16-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092258" version="1" comment="xen-kmp-desktop is &lt;4.2.3_01_k3.7.10_1.16-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092259" version="1" comment="xen-kmp-pae is &lt;4.2.3_01_k3.7.10_1.16-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092260" version="1" comment="xen-libs-32bit is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092261" version="1" comment="xen-libs is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092262" version="1" comment="xen-tools-domU is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092263" version="1" comment="xen-doc-html is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092264" version="1" comment="xen-doc-pdf is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092265" version="1" comment="xen-tools is &lt;4.2.3_01-1.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091256" version="1" comment="MozillaFirefox is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091257" version="1" comment="MozillaFirefox-branding-upstream is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091258" version="1" comment="MozillaFirefox-buildsymbols is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091259" version="1" comment="MozillaFirefox-devel is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091260" version="1" comment="MozillaFirefox-translations-common is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091261" version="1" comment="MozillaFirefox-translations-other is &lt;25.0-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091262" version="1" comment="MozillaThunderbird is &lt;24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091263" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091264" version="1" comment="MozillaThunderbird-devel is &lt;24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091265" version="1" comment="MozillaThunderbird-translations-common is &lt;24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091266" version="1" comment="MozillaThunderbird-translations-other is &lt;24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091267" version="1" comment="enigmail is &lt;1.6.0+24.1.0-61.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091268" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091269" version="1" comment="mozilla-nspr is &lt;4.10.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091270" version="1" comment="mozilla-nspr-devel is &lt;4.10.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091271" version="1" comment="mozilla-js is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091272" version="1" comment="mozilla-js-32bit is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091273" version="1" comment="xulrunner is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091274" version="1" comment="xulrunner-32bit is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091275" version="1" comment="xulrunner-buildsymbols is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091276" version="1" comment="xulrunner-devel is &lt;17.0.10-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091315" version="1" comment="python-pyOpenSSL-doc is &lt;0.13.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091316" version="1" comment="python-pyOpenSSL is &lt;0.13.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091317" version="1" comment="openvpn is &lt;2.2.2-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091318" version="1" comment="openvpn-auth-pam-plugin is &lt;2.2.2-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091319" version="1" comment="openvpn-down-root-plugin is &lt;2.2.2-9.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091721" version="1" comment="seamonkey is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091722" version="1" comment="seamonkey-dom-inspector is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091723" version="1" comment="seamonkey-irc is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091724" version="1" comment="seamonkey-translations-common is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091725" version="1" comment="seamonkey-translations-other is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091726" version="1" comment="seamonkey-venkman is &lt;2.22-1.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091320" version="1" comment="strongswan is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091321" version="1" comment="strongswan-doc is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091322" version="1" comment="strongswan-ipsec is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091323" version="1" comment="strongswan-libs0 is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091324" version="1" comment="strongswan-mysql is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091325" version="1" comment="strongswan-nm is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091326" version="1" comment="strongswan-sqlite is &lt;5.0.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091419" version="1" comment="libvarnishapi1 is &lt;3.0.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091420" version="1" comment="varnish is &lt;3.0.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091421" version="1" comment="varnish-devel is &lt;3.0.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091353" version="1" comment="apache2-mod_fcgid is &lt;2.3.6-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091361" version="1" comment="wireshark is &lt;1.8.11-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091362" version="1" comment="wireshark-devel is &lt;1.8.11-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091363" version="1" comment="whois is &lt;5.0.26-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091686" version="1" comment="chromedriver is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091687" version="1" comment="chromium is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091688" version="1" comment="chromium-desktop-gnome is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091689" version="1" comment="chromium-desktop-kde is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091690" version="1" comment="chromium-ffmpegsumo is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091691" version="1" comment="chromium-suid-helper is &lt;31.0.1650.57-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091727" version="1" comment="samba-doc is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091728" version="1" comment="libnetapi-devel is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091729" version="1" comment="libnetapi0 is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091730" version="1" comment="libsmbclient-devel is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091731" version="1" comment="libsmbclient0 is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091732" version="1" comment="libsmbclient0-32bit is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091733" version="1" comment="libsmbsharemodes-devel is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091734" version="1" comment="libsmbsharemodes0 is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091735" version="1" comment="libwbclient-devel is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091736" version="1" comment="libwbclient0 is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091737" version="1" comment="libwbclient0-32bit is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091738" version="1" comment="samba is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091739" version="1" comment="samba-32bit is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091740" version="1" comment="samba-client is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091741" version="1" comment="samba-client-32bit is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091742" version="1" comment="samba-devel is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091743" version="1" comment="samba-krb-printing is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091744" version="1" comment="samba-winbind is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091745" version="1" comment="samba-winbind-32bit is &lt;3.6.12-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091522" version="1" comment="krb5-doc is &lt;1.10.2-10.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091523" version="1" comment="krb5-mini is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091524" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091525" version="1" comment="krb5 is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091526" version="1" comment="krb5-32bit is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091527" version="1" comment="krb5-client is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091528" version="1" comment="krb5-devel is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091529" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091530" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091531" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091532" version="1" comment="krb5-server is &lt;1.10.2-10.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091465" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091466" version="1" comment="mozilla-nspr is &lt;4.10.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091467" version="1" comment="mozilla-nspr-devel is &lt;4.10.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091468" version="1" comment="libfreebl3 is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091469" version="1" comment="libfreebl3-32bit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091470" version="1" comment="libsoftokn3 is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091471" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091472" version="1" comment="mozilla-nss is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091473" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091474" version="1" comment="mozilla-nss-certs is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091475" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091476" version="1" comment="mozilla-nss-devel is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091477" version="1" comment="mozilla-nss-sysinit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091478" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091479" version="1" comment="mozilla-nss-tools is &lt;3.15.3-1.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092047" version="1" comment="gtk3 is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092048" version="1" comment="gtk3-branding-upstream is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092049" version="1" comment="gtk3-data is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092050" version="1" comment="gtk3-devel is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092051" version="1" comment="gtk3-devel-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092052" version="1" comment="gtk3-immodule-amharic is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092053" version="1" comment="gtk3-immodule-amharic-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092054" version="1" comment="gtk3-immodule-inuktitut is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092055" version="1" comment="gtk3-immodule-inuktitut-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092056" version="1" comment="gtk3-immodule-multipress is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092057" version="1" comment="gtk3-immodule-multipress-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092058" version="1" comment="gtk3-immodule-thai is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092059" version="1" comment="gtk3-immodule-thai-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092060" version="1" comment="gtk3-immodule-vietnamese is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092061" version="1" comment="gtk3-immodule-vietnamese-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092062" version="1" comment="gtk3-immodule-xim is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092063" version="1" comment="gtk3-immodule-xim-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092064" version="1" comment="gtk3-immodules-tigrigna is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092065" version="1" comment="gtk3-immodules-tigrigna-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092066" version="1" comment="gtk3-lang is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092067" version="1" comment="gtk3-tools is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092068" version="1" comment="gtk3-tools-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092069" version="1" comment="libgtk-3-0 is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092070" version="1" comment="libgtk-3-0-32bit is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092071" version="1" comment="typelib-1_0-Gtk-3_0 is &lt;3.6.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092072" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092073" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092074" version="1" comment="gtk2-engine-svg is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092075" version="1" comment="gtk2-engine-svg-32bit is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092076" version="1" comment="librsvg-2-2 is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092077" version="1" comment="librsvg-2-2-32bit is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092078" version="1" comment="librsvg is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092079" version="1" comment="librsvg-devel is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092080" version="1" comment="rsvg-view is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092081" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.36.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091594" version="1" comment="nginx is &lt;1.2.9-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091757" version="1" comment="horde5 is &lt;5.0.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091895" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091896" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091897" version="1" comment="subversion is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091898" version="1" comment="subversion-bash-completion is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091899" version="1" comment="subversion-devel is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091900" version="1" comment="subversion-perl is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091901" version="1" comment="subversion-python is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091902" version="1" comment="subversion-server is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091903" version="1" comment="subversion-tools is &lt;1.7.14-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091813" version="1" comment="ruby19 is &lt;1.9.3.p392-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091814" version="1" comment="ruby19-devel is &lt;1.9.3.p392-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091815" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091816" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091817" version="1" comment="ruby19-tk is &lt;1.9.3.p392-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091904" version="1" comment="curl is &lt;7.28.1-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091905" version="1" comment="libcurl-devel is &lt;7.28.1-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091906" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091907" version="1" comment="libcurl4 is &lt;7.28.1-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091908" version="1" comment="nodejs is &lt;0.8.12-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091909" version="1" comment="nodejs-devel is &lt;0.8.12-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091910" version="1" comment="thttpd is &lt;2.25b-195.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091987" version="1" comment="ca-certificates-mozilla is &lt;1.95-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092208" version="1" comment="chromedriver is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092209" version="1" comment="chromium is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092210" version="1" comment="chromium-desktop-gnome is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092211" version="1" comment="chromium-desktop-kde is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092212" version="1" comment="chromium-ffmpegsumo is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092213" version="1" comment="chromium-suid-helper is &lt;31.0.1650.63-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092082" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092083" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092084" version="1" comment="MozillaFirefox is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092085" version="1" comment="MozillaFirefox-branding-upstream is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092086" version="1" comment="MozillaFirefox-buildsymbols is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092087" version="1" comment="MozillaFirefox-devel is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092088" version="1" comment="MozillaFirefox-translations-common is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092089" version="1" comment="MozillaFirefox-translations-other is &lt;26.0-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092266" version="1" comment="MozillaThunderbird is &lt;24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092267" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092268" version="1" comment="MozillaThunderbird-devel is &lt;24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092269" version="1" comment="MozillaThunderbird-translations-common is &lt;24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092270" version="1" comment="MozillaThunderbird-translations-other is &lt;24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092271" version="1" comment="enigmail is &lt;1.6.0+24.2.0-61.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092927" version="1" comment="lighttpd is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092928" version="1" comment="lighttpd-mod_cml is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092929" version="1" comment="lighttpd-mod_geoip is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092930" version="1" comment="lighttpd-mod_magnet is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092931" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092932" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092933" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092934" version="1" comment="lighttpd-mod_webdav is &lt;1.4.31-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091950" version="1" comment="libfreebl3 is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091951" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091952" version="1" comment="libsoftokn3 is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091953" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091954" version="1" comment="mozilla-nss is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091955" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091956" version="1" comment="mozilla-nss-certs is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091957" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091958" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091959" version="1" comment="mozilla-nss-sysinit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091960" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091961" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092214" version="1" comment="rubygem-i18n is &lt;0.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092215" version="1" comment="rubygem-i18n-doc is &lt;0.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092216" version="1" comment="rubygem-i18n-testsuite is &lt;0.6.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092217" version="1" comment="openttd is &lt;1.3.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092218" version="1" comment="openttd-data is &lt;1.3.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092219" version="1" comment="openttd-dedicated is &lt;1.3.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092220" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092221" version="1" comment="rubygem-activesupport-3_2-doc is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092222" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092223" version="1" comment="rubygem-actionmailer-3_2-doc is &lt;3.2.12-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092537" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092538" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092539" version="1" comment="seamonkey is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092540" version="1" comment="seamonkey-dom-inspector is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092541" version="1" comment="seamonkey-irc is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092542" version="1" comment="seamonkey-translations-common is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092543" version="1" comment="seamonkey-translations-other is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092544" version="1" comment="seamonkey-venkman is &lt;2.23-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092272" version="1" comment="libv8-3 is &lt;3.22.24.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092273" version="1" comment="v8 is &lt;3.22.24.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092274" version="1" comment="v8-devel is &lt;3.22.24.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092275" version="1" comment="v8-private-headers-devel is &lt;3.22.24.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092276" version="1" comment="webyast-base is &lt;0.3.43.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092277" version="1" comment="webyast-base-branding-default is &lt;0.3.43.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092278" version="1" comment="webyast-base-testsuite is &lt;0.3.43.1-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092421" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092422" version="1" comment="php5 is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092423" version="1" comment="php5-bcmath is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092424" version="1" comment="php5-bz2 is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092425" version="1" comment="php5-calendar is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092426" version="1" comment="php5-ctype is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092427" version="1" comment="php5-curl is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092428" version="1" comment="php5-dba is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092429" version="1" comment="php5-devel is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092430" version="1" comment="php5-dom is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092431" version="1" comment="php5-enchant is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092432" version="1" comment="php5-exif is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092433" version="1" comment="php5-fastcgi is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092434" version="1" comment="php5-fileinfo is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092435" version="1" comment="php5-fpm is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092436" version="1" comment="php5-ftp is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092437" version="1" comment="php5-gd is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092438" version="1" comment="php5-gettext is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092439" version="1" comment="php5-gmp is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092440" version="1" comment="php5-iconv is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092441" version="1" comment="php5-imap is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092442" version="1" comment="php5-intl is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092443" version="1" comment="php5-json is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092444" version="1" comment="php5-ldap is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092445" version="1" comment="php5-mbstring is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092446" version="1" comment="php5-mcrypt is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092447" version="1" comment="php5-mssql is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092448" version="1" comment="php5-mysql is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092449" version="1" comment="php5-odbc is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092450" version="1" comment="php5-openssl is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092451" version="1" comment="php5-pcntl is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092452" version="1" comment="php5-pdo is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092453" version="1" comment="php5-pear is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092454" version="1" comment="php5-pgsql is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092455" version="1" comment="php5-phar is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092456" version="1" comment="php5-posix is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092457" version="1" comment="php5-pspell is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092458" version="1" comment="php5-readline is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092459" version="1" comment="php5-shmop is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092460" version="1" comment="php5-snmp is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092461" version="1" comment="php5-soap is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092462" version="1" comment="php5-sockets is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092463" version="1" comment="php5-sqlite is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092464" version="1" comment="php5-suhosin is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092465" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092466" version="1" comment="php5-sysvsem is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092467" version="1" comment="php5-sysvshm is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092468" version="1" comment="php5-tidy is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092469" version="1" comment="php5-tokenizer is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092470" version="1" comment="php5-wddx is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092471" version="1" comment="php5-xmlreader is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092472" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092473" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092474" version="1" comment="php5-xsl is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092475" version="1" comment="php5-zip is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092476" version="1" comment="php5-zlib is &lt;5.3.17-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092545" version="1" comment="wireshark is &lt;1.8.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092546" version="1" comment="wireshark-devel is &lt;1.8.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092477" version="1" comment="xorg-x11-server is &lt;7.6_1.13.2-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092478" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.13.2-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092479" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.13.2-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092547" version="1" comment="libpixman-1-0 is &lt;0.28.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092548" version="1" comment="libpixman-1-0-32bit is &lt;0.28.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092549" version="1" comment="libpixman-1-0-devel is &lt;0.28.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092550" version="1" comment="pixman is &lt;0.28.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092551" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092552" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092553" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092554" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092555" version="1" comment="openssl is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092556" version="1" comment="openssl-doc is &lt;1.0.1e-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092557" version="1" comment="nagios is &lt;3.5.0-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092558" version="1" comment="nagios-devel is &lt;3.5.0-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092559" version="1" comment="nagios-www is &lt;3.5.0-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092560" version="1" comment="nagios-www-dch is &lt;3.5.0-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092708" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092709" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092710" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092711" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092712" version="1" comment="openssl is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092713" version="1" comment="openssl-doc is &lt;1.0.1e-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092935" version="1" comment="libqt4-devel-doc is &lt;4.8.4-3.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092936" version="1" comment="libqt4-devel-doc-data is &lt;4.8.4-3.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092937" version="1" comment="qt4-x11-tools is &lt;4.8.4-3.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092938" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092939" version="1" comment="libqt4-sql-mysql is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092940" version="1" comment="libqt4-sql-plugins is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092941" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092942" version="1" comment="libqt4-sql-postgresql is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092943" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092944" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092945" version="1" comment="libqt4-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092946" version="1" comment="libqt4 is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092947" version="1" comment="libqt4-devel is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092948" version="1" comment="libqt4-private-headers-devel is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092949" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092950" version="1" comment="libqt4-qt3support is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092951" version="1" comment="libqt4-sql-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092952" version="1" comment="libqt4-sql is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092953" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092954" version="1" comment="libqt4-sql-sqlite is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092955" version="1" comment="libqt4-x11-32bit is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092956" version="1" comment="libqt4-x11 is &lt;4.8.4-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093009" version="1" comment="icinga is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093010" version="1" comment="icinga-devel is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093011" version="1" comment="icinga-doc is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093012" version="1" comment="icinga-idoutils is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093013" version="1" comment="icinga-idoutils-mysql is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093014" version="1" comment="icinga-idoutils-oracle is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093015" version="1" comment="icinga-idoutils-pgsql is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093016" version="1" comment="icinga-plugins-downtimes is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093017" version="1" comment="icinga-plugins-eventhandlers is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093018" version="1" comment="icinga-www is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093019" version="1" comment="monitoring-tools is &lt;1.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093020" version="1" comment="nagios-rpm-macros is &lt;0.08-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092957" version="1" comment="lightdm-gtk-greeter is &lt;1.3.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092958" version="1" comment="lightdm-gtk-greeter-branding-upstream is &lt;1.3.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092959" version="1" comment="lightdm-gtk-greeter-lang is &lt;1.3.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093021" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093022" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093023" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093024" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093025" version="1" comment="openssl is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093026" version="1" comment="openssl-doc is &lt;1.0.1e-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092960" version="1" comment="libXfont is &lt;1.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092961" version="1" comment="libXfont-devel is &lt;1.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092962" version="1" comment="libXfont-devel-32bit is &lt;1.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092963" version="1" comment="libXfont1 is &lt;1.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092964" version="1" comment="libXfont1-32bit is &lt;1.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093112" version="1" comment="gnumeric is &lt;1.12.0-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093113" version="1" comment="gnumeric-devel is &lt;1.12.0-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093114" version="1" comment="gnumeric-lang is &lt;1.12.0-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093059" version="1" comment="cups is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093060" version="1" comment="cups-client is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093061" version="1" comment="cups-ddk is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093062" version="1" comment="cups-devel is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093063" version="1" comment="cups-libs is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093064" version="1" comment="cups-libs-32bit is &lt;1.5.4-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093074" version="1" comment="hplip is &lt;3.12.11-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093075" version="1" comment="hplip-hpijs is &lt;3.12.11-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093076" version="1" comment="hplip-sane is &lt;3.12.11-2.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093226" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093227" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093228" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093229" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093230" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093231" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093232" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.6-8.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093150" version="1" comment="tor is &lt;0.2.3.25-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093374" version="1" comment="libpoppler-qt4-4 is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093375" version="1" comment="libpoppler-qt4-devel is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093376" version="1" comment="poppler-qt is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093377" version="1" comment="libpoppler-cpp0 is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093378" version="1" comment="libpoppler-devel is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093379" version="1" comment="libpoppler-glib-devel is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093380" version="1" comment="libpoppler-glib8 is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093381" version="1" comment="libpoppler34 is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093382" version="1" comment="poppler is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093383" version="1" comment="poppler-tools is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093384" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.22.1-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093283" version="1" comment="bind is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093284" version="1" comment="bind-chrootenv is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093285" version="1" comment="bind-devel is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093286" version="1" comment="bind-doc is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093287" version="1" comment="bind-libs-32bit is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093288" version="1" comment="bind-libs is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093289" version="1" comment="bind-lwresd is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093290" version="1" comment="bind-utils is &lt;9.9.4P2-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093291" version="1" comment="qemu is &lt;1.3.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093292" version="1" comment="qemu-guest-agent is &lt;1.3.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093293" version="1" comment="qemu-linux-user is &lt;1.3.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093294" version="1" comment="qemu-tools is &lt;1.3.1-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093642" version="1" comment="bot-sentry is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093643" version="1" comment="libpurple-plugin-bot-sentry is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093644" version="1" comment="libpurple-plugin-bot-sentry-lang is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093645" version="1" comment="pidgin-advanced-sound-notification is &lt;1.2.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093646" version="1" comment="pidgin-advanced-sound-notification-lang is &lt;1.2.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093647" version="1" comment="pidgin-plugin-advanced-sound-notification is &lt;1.2.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093648" version="1" comment="pidgin-birthday-reminder is &lt;1.7-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093649" version="1" comment="pidgin-birthday-reminder-lang is &lt;1.7-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093650" version="1" comment="pidgin-plugin-birthday-reminder is &lt;1.7-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093651" version="1" comment="libpurple-branding-openSUSE is &lt;12.2-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093652" version="1" comment="pidgin-branding-openSUSE is &lt;12.2-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093653" version="1" comment="pidgin-embeddedvideo is &lt;1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093654" version="1" comment="pidgin-plugin-embeddedvideo is &lt;1.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093655" version="1" comment="libpurple-plugin-facebookchat is &lt;1.69-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093656" version="1" comment="pidgin-facebookchat is &lt;1.69-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093657" version="1" comment="pidgin-guifications is &lt;2.16-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093658" version="1" comment="pidgin-guifications-lang is &lt;2.16-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093659" version="1" comment="pidgin-plugin-guifications is &lt;2.16-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093660" version="1" comment="libpurple-plugin-mrim is &lt;0.1.28-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093661" version="1" comment="libpurple-plugin-mrim-lang is &lt;0.1.28-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093662" version="1" comment="pidgin-mrim is &lt;0.1.28-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093663" version="1" comment="libpurple-plugin-openfetion is &lt;0.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093664" version="1" comment="libpurple-plugin-openfetion-lang is &lt;0.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093665" version="1" comment="pidgin-openfetion is &lt;0.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093666" version="1" comment="pidgin-otr is &lt;4.0.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093667" version="1" comment="libpurple-plugin-sipe is &lt;1.14.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093668" version="1" comment="pidgin-sipe is &lt;1.14.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093669" version="1" comment="telepathy-plugin-sipe is &lt;1.14.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093670" version="1" comment="finch is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093671" version="1" comment="finch-devel is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093672" version="1" comment="libpurple is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093673" version="1" comment="libpurple-branding-upstream is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093674" version="1" comment="libpurple-devel is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093675" version="1" comment="libpurple-lang is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093676" version="1" comment="libpurple-meanwhile is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093677" version="1" comment="libpurple-tcl is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093678" version="1" comment="pidgin is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093679" version="1" comment="pidgin-devel is &lt;2.10.9-4.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093680" version="1" comment="libpurple-plugin-pack is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093681" version="1" comment="libpurple-plugin-pack-extras is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093682" version="1" comment="pidgin-plugin-pack is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093683" version="1" comment="pidgin-plugin-pack-extras is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093684" version="1" comment="purple-plugin-pack is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093685" version="1" comment="purple-plugin-pack-lang is &lt;2.7.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093686" version="1" comment="libpurple-plugin-skype is &lt;0.0.1.rev624-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093687" version="1" comment="libpurple-plugin-skype-lang is &lt;0.0.1.rev624-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093688" version="1" comment="pidgin-plugin-skype is &lt;0.0.1.rev624-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093689" version="1" comment="skype4pidgin is &lt;0.0.1.rev624-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093690" version="1" comment="telepathy-haze is &lt;0.6.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093295" version="1" comment="kernel-debug is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093296" version="1" comment="kernel-debug-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093297" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093298" version="1" comment="kernel-default is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093299" version="1" comment="kernel-default-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093300" version="1" comment="kernel-default-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093301" version="1" comment="kernel-desktop is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093302" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093303" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093304" version="1" comment="kernel-docs is &lt;3.7.10-1.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093305" version="1" comment="kernel-ec2 is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093306" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093307" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093308" version="1" comment="kernel-pae is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093309" version="1" comment="kernel-pae-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093310" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093311" version="1" comment="kernel-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093312" version="1" comment="kernel-source is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093313" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093314" version="1" comment="kernel-syms is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093315" version="1" comment="kernel-trace is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093316" version="1" comment="kernel-trace-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093317" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093318" version="1" comment="kernel-vanilla is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093319" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093320" version="1" comment="kernel-xen is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093321" version="1" comment="kernel-xen-base is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093322" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093396" version="1" comment="MozillaFirefox is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093397" version="1" comment="MozillaFirefox-branding-upstream is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093398" version="1" comment="MozillaFirefox-buildsymbols is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093399" version="1" comment="MozillaFirefox-devel is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093400" version="1" comment="MozillaFirefox-translations-common is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093401" version="1" comment="MozillaFirefox-translations-other is &lt;27.0-1.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093402" version="1" comment="MozillaThunderbird is &lt;24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093403" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093404" version="1" comment="MozillaThunderbird-devel is &lt;24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093405" version="1" comment="MozillaThunderbird-translations-common is &lt;24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093406" version="1" comment="MozillaThunderbird-translations-other is &lt;24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093407" version="1" comment="enigmail is &lt;1.6.0+24.3.0-61.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093408" version="1" comment="libfreebl3 is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093409" version="1" comment="libfreebl3-32bit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093410" version="1" comment="libsoftokn3 is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093411" version="1" comment="libsoftokn3-32bit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093412" version="1" comment="mozilla-nss is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093413" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093414" version="1" comment="mozilla-nss-certs is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093415" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093416" version="1" comment="mozilla-nss-devel is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093417" version="1" comment="mozilla-nss-sysinit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093418" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093419" version="1" comment="mozilla-nss-tools is &lt;3.15.4-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093420" version="1" comment="seamonkey is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093421" version="1" comment="seamonkey-dom-inspector is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093422" version="1" comment="seamonkey-irc is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093423" version="1" comment="seamonkey-translations-common is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093424" version="1" comment="seamonkey-translations-other is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093425" version="1" comment="seamonkey-venkman is &lt;2.24-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093503" version="1" comment="chromedriver is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093504" version="1" comment="chromium is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093505" version="1" comment="chromium-desktop-gnome is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093506" version="1" comment="chromium-desktop-kde is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093507" version="1" comment="chromium-ffmpegsumo is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093508" version="1" comment="chromium-suid-helper is &lt;32.0.1700.102-1.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093620" version="1" comment="curl is &lt;7.28.1-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093621" version="1" comment="libcurl-devel is &lt;7.28.1-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093622" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093623" version="1" comment="libcurl4 is &lt;7.28.1-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093545" version="1" comment="libyaml-0-2 is &lt;0.1.3-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093546" version="1" comment="libyaml is &lt;0.1.3-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093547" version="1" comment="libyaml-devel is &lt;0.1.3-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093548" version="1" comment="libvirt is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093549" version="1" comment="libvirt-client is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093550" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093551" version="1" comment="libvirt-devel is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093552" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093553" version="1" comment="libvirt-doc is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093554" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093555" version="1" comment="libvirt-python is &lt;1.0.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093556" version="1" comment="mumble is &lt;1.2.5-21.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093557" version="1" comment="mumble-32bit is &lt;1.2.5-21.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093558" version="1" comment="mumble-server is &lt;1.2.5-21.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093559" version="1" comment="icinga is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093560" version="1" comment="icinga-devel is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093561" version="1" comment="icinga-doc is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093562" version="1" comment="icinga-idoutils is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093563" version="1" comment="icinga-idoutils-mysql is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093564" version="1" comment="icinga-idoutils-oracle is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093565" version="1" comment="icinga-idoutils-pgsql is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093566" version="1" comment="icinga-plugins-downtimes is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093567" version="1" comment="icinga-plugins-eventhandlers is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093568" version="1" comment="icinga-www is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093569" version="1" comment="monitoring-tools is &lt;1.10.2-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093691" version="1" comment="icedtea-web is &lt;1.4.2-4.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093692" version="1" comment="icedtea-web-javadoc is &lt;1.4.2-4.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093970" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093971" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093972" version="1" comment="subversion is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093973" version="1" comment="subversion-bash-completion is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093974" version="1" comment="subversion-devel is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093975" version="1" comment="subversion-perl is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093976" version="1" comment="subversion-python is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093977" version="1" comment="subversion-server is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093978" version="1" comment="subversion-tools is &lt;1.7.16-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093693" version="1" comment="python-logilab-common is &lt;0.58.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093694" version="1" comment="python3-logilab-common is &lt;0.58.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093637" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093638" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093940" version="1" comment="chromedriver is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093941" version="1" comment="chromium is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093942" version="1" comment="chromium-desktop-gnome is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093943" version="1" comment="chromium-desktop-kde is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093944" version="1" comment="chromium-ffmpegsumo is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093945" version="1" comment="chromium-suid-helper is &lt;33.0.1750.117-1.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093979" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093980" version="1" comment="rubygem-actionmailer-3_2-doc is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093981" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093982" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093983" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093984" version="1" comment="rubygem-activerecord-3_2-doc is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093985" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093986" version="1" comment="rubygem-activesupport-3_2-doc is &lt;3.2.12-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094648" version="1" comment="xen is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094649" version="1" comment="xen-devel is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094650" version="1" comment="xen-kmp-default is &lt;4.2.4_02_k3.7.10_1.28-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094651" version="1" comment="xen-kmp-desktop is &lt;4.2.4_02_k3.7.10_1.28-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094652" version="1" comment="xen-kmp-pae is &lt;4.2.4_02_k3.7.10_1.28-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094653" version="1" comment="xen-libs-32bit is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094654" version="1" comment="xen-libs is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094655" version="1" comment="xen-tools-domU is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094656" version="1" comment="xen-doc-html is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094657" version="1" comment="xen-doc-pdf is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094658" version="1" comment="xen-tools is &lt;4.2.4_02-1.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094013" version="1" comment="phpMyAdmin is &lt;4.1.8-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094014" version="1" comment="freeradius-server is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094015" version="1" comment="freeradius-server-devel is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094016" version="1" comment="freeradius-server-dialupadmin is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094017" version="1" comment="freeradius-server-doc is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094018" version="1" comment="freeradius-server-libs is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094019" version="1" comment="freeradius-server-utils is &lt;2.2.0-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094020" version="1" comment="libecpg6-32bit is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094021" version="1" comment="libecpg6 is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094022" version="1" comment="libpq5-32bit is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094023" version="1" comment="libpq5 is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094024" version="1" comment="postgresql92-devel is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094025" version="1" comment="postgresql92-libs is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094026" version="1" comment="postgresql92 is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094027" version="1" comment="postgresql92-contrib is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094028" version="1" comment="postgresql92-docs is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094029" version="1" comment="postgresql92-plperl is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094030" version="1" comment="postgresql92-plpython is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094031" version="1" comment="postgresql92-pltcl is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094032" version="1" comment="postgresql92-server is &lt;9.2.7-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094033" version="1" comment="fail2ban is &lt;0.8.12-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093946" version="1" comment="gnutls is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093947" version="1" comment="libgnutls-devel is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093948" version="1" comment="libgnutls-devel-32bit is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093949" version="1" comment="libgnutls-openssl-devel is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093950" version="1" comment="libgnutls-openssl27 is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093951" version="1" comment="libgnutls28 is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093952" version="1" comment="libgnutls28-32bit is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093953" version="1" comment="libgnutlsxx-devel is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093954" version="1" comment="libgnutlsxx28 is &lt;3.0.28-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094178" version="1" comment="file is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094179" version="1" comment="file-devel is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094180" version="1" comment="libmagic-data is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094181" version="1" comment="libmagic1-32bit is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094182" version="1" comment="libmagic1 is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094183" version="1" comment="python-magic is &lt;5.11-12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094428" version="1" comment="php5-pear-Net_IDNA2 is &lt;0.1.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094429" version="1" comment="roundcubemail is &lt;0.9.5-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094359" version="1" comment="libssh is &lt;0.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094360" version="1" comment="libssh-devel is &lt;0.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094361" version="1" comment="libssh-devel-doc is &lt;0.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094362" version="1" comment="libssh4 is &lt;0.5.3-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094116" version="1" comment="otrs is &lt;3.1.20-26.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094117" version="1" comment="otrs-doc is &lt;3.1.20-26.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094118" version="1" comment="otrs-itsm is &lt;3.1.10-26.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094119" version="1" comment="percona-toolkit is &lt;2.1.11-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094363" version="1" comment="ImageMagick is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094364" version="1" comment="ImageMagick-devel-32bit is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094365" version="1" comment="ImageMagick-devel is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094366" version="1" comment="ImageMagick-doc is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094367" version="1" comment="ImageMagick-extra is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094368" version="1" comment="libMagick++-devel is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094369" version="1" comment="libMagick++5 is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094370" version="1" comment="libMagickCore5-32bit is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094371" version="1" comment="libMagickCore5 is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094372" version="1" comment="libMagickWand5-32bit is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094373" version="1" comment="libMagickWand5 is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094374" version="1" comment="perl-PerlMagick is &lt;6.7.8.8-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094184" version="1" comment="wireshark is &lt;1.8.13-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094185" version="1" comment="wireshark-devel is &lt;1.8.13-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094186" version="1" comment="libyaml-0-2 is &lt;0.1.3-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094187" version="1" comment="libyaml is &lt;0.1.3-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094188" version="1" comment="libyaml-devel is &lt;0.1.3-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094189" version="1" comment="udisks is &lt;1.0.4-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094190" version="1" comment="udisks-devel is &lt;1.0.4-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094191" version="1" comment="libudisks2-0 is &lt;2.0.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094192" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.0.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094193" version="1" comment="udisks2 is &lt;2.0.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094194" version="1" comment="udisks2-devel is &lt;2.0.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094195" version="1" comment="udisks2-lang is &lt;2.0.0-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094229" version="1" comment="libsnmp30-32bit is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094230" version="1" comment="libsnmp30 is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094231" version="1" comment="net-snmp is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094232" version="1" comment="net-snmp-devel-32bit is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094233" version="1" comment="net-snmp-devel is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094234" version="1" comment="perl-SNMP is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094235" version="1" comment="snmp-mibs is &lt;5.7.2-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094236" version="1" comment="libjansson is &lt;2.3.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094237" version="1" comment="libjansson-devel is &lt;2.3.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094238" version="1" comment="libjansson4 is &lt;2.3.1-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094251" version="1" comment="samba-doc is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094252" version="1" comment="libnetapi-devel is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094253" version="1" comment="libnetapi0 is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094254" version="1" comment="libsmbclient-devel is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094255" version="1" comment="libsmbclient0 is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094256" version="1" comment="libsmbclient0-32bit is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094257" version="1" comment="libsmbsharemodes-devel is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094258" version="1" comment="libsmbsharemodes0 is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094259" version="1" comment="libwbclient-devel is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094260" version="1" comment="libwbclient0 is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094261" version="1" comment="libwbclient0-32bit is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094262" version="1" comment="samba is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094263" version="1" comment="samba-32bit is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094264" version="1" comment="samba-client is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094265" version="1" comment="samba-client-32bit is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094266" version="1" comment="samba-devel is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094267" version="1" comment="samba-krb-printing is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094268" version="1" comment="samba-winbind is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094269" version="1" comment="samba-winbind-32bit is &lt;3.6.12-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094430" version="1" comment="icinga is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094431" version="1" comment="icinga-devel is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094432" version="1" comment="icinga-doc is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094433" version="1" comment="icinga-idoutils is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094434" version="1" comment="icinga-idoutils-mysql is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094435" version="1" comment="icinga-idoutils-oracle is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094436" version="1" comment="icinga-idoutils-pgsql is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094437" version="1" comment="icinga-plugins-downtimes is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094438" version="1" comment="icinga-plugins-eventhandlers is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094439" version="1" comment="icinga-www is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094440" version="1" comment="monitoring-tools is &lt;1.10.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094469" version="1" comment="perl-HTTP-Body is &lt;1.19-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094470" version="1" comment="mutt is &lt;1.5.21-36.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094471" version="1" comment="file is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094472" version="1" comment="file-devel is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094473" version="1" comment="libmagic-data is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094474" version="1" comment="libmagic1-32bit is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094475" version="1" comment="libmagic1 is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094476" version="1" comment="python-magic is &lt;5.11-12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094485" version="1" comment="lighttpd is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094486" version="1" comment="lighttpd-mod_cml is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094487" version="1" comment="lighttpd-mod_geoip is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094488" version="1" comment="lighttpd-mod_magnet is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094489" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094490" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094491" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094492" version="1" comment="lighttpd-mod_webdav is &lt;1.4.35-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094493" version="1" comment="MozillaFirefox is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094494" version="1" comment="MozillaFirefox-branding-upstream is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094495" version="1" comment="MozillaFirefox-buildsymbols is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094496" version="1" comment="MozillaFirefox-devel is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094497" version="1" comment="MozillaFirefox-translations-common is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094498" version="1" comment="MozillaFirefox-translations-other is &lt;28.0-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094499" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094500" version="1" comment="mozilla-nspr is &lt;4.10.4-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094501" version="1" comment="mozilla-nspr-devel is &lt;4.10.4-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094502" version="1" comment="libfreebl3 is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094503" version="1" comment="libfreebl3-32bit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094504" version="1" comment="libsoftokn3 is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094505" version="1" comment="libsoftokn3-32bit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094506" version="1" comment="mozilla-nss is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094507" version="1" comment="mozilla-nss-32bit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094508" version="1" comment="mozilla-nss-certs is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094509" version="1" comment="mozilla-nss-certs-32bit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094510" version="1" comment="mozilla-nss-devel is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094511" version="1" comment="mozilla-nss-sysinit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094512" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094513" version="1" comment="mozilla-nss-tools is &lt;3.15.5-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094659" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094660" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094661" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094662" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094663" version="1" comment="openssl is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094664" version="1" comment="openssl-doc is &lt;1.0.1e-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094665" version="1" comment="file is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094666" version="1" comment="file-devel is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094667" version="1" comment="libmagic-data is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094668" version="1" comment="libmagic1-32bit is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094669" version="1" comment="libmagic1 is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094670" version="1" comment="python-magic is &lt;5.11-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094853" version="1" comment="chromedriver is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094854" version="1" comment="chromium is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094855" version="1" comment="chromium-desktop-gnome is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094856" version="1" comment="chromium-desktop-kde is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094857" version="1" comment="chromium-ffmpegsumo is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094858" version="1" comment="chromium-suid-helper is &lt;33.0.1750.152-1.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095307" version="1" comment="MozillaThunderbird is &lt;24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095308" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095309" version="1" comment="MozillaThunderbird-devel is &lt;24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095310" version="1" comment="MozillaThunderbird-translations-common is &lt;24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095311" version="1" comment="MozillaThunderbird-translations-other is &lt;24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095312" version="1" comment="enigmail is &lt;1.6.0+24.4.0-61.43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095313" version="1" comment="seamonkey is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095314" version="1" comment="seamonkey-dom-inspector is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095315" version="1" comment="seamonkey-irc is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095316" version="1" comment="seamonkey-translations-common is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095317" version="1" comment="seamonkey-translations-other is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095318" version="1" comment="seamonkey-venkman is &lt;2.25-1.41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094859" version="1" comment="libyaml-0-2 is &lt;0.1.3-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094860" version="1" comment="libyaml is &lt;0.1.3-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094861" version="1" comment="libyaml-devel is &lt;0.1.3-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094900" version="1" comment="nagios is &lt;3.5.0-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094901" version="1" comment="nagios-devel is &lt;3.5.0-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094902" version="1" comment="nagios-www is &lt;3.5.0-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094903" version="1" comment="nagios-www-dch is &lt;3.5.0-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094862" version="1" comment="a2ps is &lt;4.13-1353.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094863" version="1" comment="a2ps-devel is &lt;4.13-1353.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094904" version="1" comment="xinetd is &lt;2.3.14-163.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095130" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-114.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095131" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-114.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094905" version="1" comment="rubygem-rack-ssl is &lt;1.3.2-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094906" version="1" comment="rubygem-rack-ssl-doc is &lt;1.3.2-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094907" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094908" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094909" version="1" comment="python-base is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094910" version="1" comment="python-base-32bit is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094911" version="1" comment="python-devel is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094912" version="1" comment="python-xml is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094913" version="1" comment="python-doc is &lt;2.7-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094914" version="1" comment="python-doc-pdf is &lt;2.7-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094915" version="1" comment="python is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094916" version="1" comment="python-32bit is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094917" version="1" comment="python-curses is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094918" version="1" comment="python-demo is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094919" version="1" comment="python-gdbm is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094920" version="1" comment="python-idle is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094921" version="1" comment="python-tk is &lt;2.7.3-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095132" version="1" comment="otrs is &lt;3.1.21-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095133" version="1" comment="otrs-doc is &lt;3.1.21-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095134" version="1" comment="otrs-itsm is &lt;3.1.10-26.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094698" version="1" comment="libopenssl-devel is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094699" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094700" version="1" comment="libopenssl1_0_0 is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094701" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094702" version="1" comment="openssl is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094703" version="1" comment="openssl-doc is &lt;1.0.1e-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095135" version="1" comment="couchdb is &lt;1.2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095136" version="1" comment="squid is &lt;3.2.11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095331" version="1" comment="curl is &lt;7.28.1-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095332" version="1" comment="libcurl-devel is &lt;7.28.1-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095333" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095334" version="1" comment="libcurl4 is &lt;7.28.1-4.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095137" version="1" comment="json-c is &lt;0.9-13.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095138" version="1" comment="libjson-devel is &lt;0.9-13.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095139" version="1" comment="libjson-doc is &lt;0.9-13.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095140" version="1" comment="libjson0 is &lt;0.9-13.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095141" version="1" comment="libjson0-32bit is &lt;0.9-13.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095335" version="1" comment="libpython3_3m1_0 is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095336" version="1" comment="libpython3_3m1_0-32bit is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095337" version="1" comment="python3-base is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095338" version="1" comment="python3-base-32bit is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095339" version="1" comment="python3-devel is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095340" version="1" comment="python3-idle is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095341" version="1" comment="python3-testsuite is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095342" version="1" comment="python3-tools is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095343" version="1" comment="python3-doc is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095344" version="1" comment="python3-doc-pdf is &lt;3.3.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095345" version="1" comment="python3 is &lt;3.3.0-6.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095346" version="1" comment="python3-32bit is &lt;3.3.0-6.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095347" version="1" comment="python3-curses is &lt;3.3.0-6.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095348" version="1" comment="python3-dbm is &lt;3.3.0-6.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095349" version="1" comment="python3-tk is &lt;3.3.0-6.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095142" version="1" comment="libopenssl-devel is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095143" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095144" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095145" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095146" version="1" comment="openssl is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095147" version="1" comment="openssl-doc is &lt;1.0.1g-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095350" version="1" comment="chromedriver is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095351" version="1" comment="chromium is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095352" version="1" comment="chromium-desktop-gnome is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095353" version="1" comment="chromium-desktop-kde is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095354" version="1" comment="chromium-ffmpegsumo is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095355" version="1" comment="chromium-suid-helper is &lt;34.0.1847.116-1.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095356" version="1" comment="cacti-spine is &lt;0.8.8b-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095357" version="1" comment="cacti is &lt;0.8.8b-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095358" version="1" comment="libopenssl-devel is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095359" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095360" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095361" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095362" version="1" comment="openssl is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095363" version="1" comment="openssl-doc is &lt;1.0.1g-1.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095364" version="1" comment="python-imaging is &lt;1.1.7-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095365" version="1" comment="python-imaging-sane is &lt;1.1.7-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095366" version="1" comment="libmms is &lt;0.6.2-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095367" version="1" comment="libmms-devel is &lt;0.6.2-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095368" version="1" comment="libmms0 is &lt;0.6.2-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095369" version="1" comment="libmms0-32bit is &lt;0.6.2-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095370" version="1" comment="nagios-plugins-nrpe is &lt;2.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095371" version="1" comment="nrpe is &lt;2.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095372" version="1" comment="nrpe-doc is &lt;2.14-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095493" version="1" comment="libpng15 is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095494" version="1" comment="libpng15-15 is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095495" version="1" comment="libpng15-15-32bit is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095496" version="1" comment="libpng15-compat-devel is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095497" version="1" comment="libpng15-compat-devel-32bit is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095498" version="1" comment="libpng15-devel is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095499" version="1" comment="libpng15-devel-32bit is &lt;1.5.13-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095500" version="1" comment="libpng12-0 is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095501" version="1" comment="libpng12-0-32bit is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095502" version="1" comment="libpng12 is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095503" version="1" comment="libpng12-compat-devel is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095504" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095505" version="1" comment="libpng12-devel is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095506" version="1" comment="libpng12-devel-32bit is &lt;1.2.50-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095373" version="1" comment="MozillaFirefox is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095374" version="1" comment="MozillaFirefox-branding-upstream is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095375" version="1" comment="MozillaFirefox-buildsymbols is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095376" version="1" comment="MozillaFirefox-devel is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095377" version="1" comment="MozillaFirefox-translations-common is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095378" version="1" comment="MozillaFirefox-translations-other is &lt;29.0-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095379" version="1" comment="libfreebl3 is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095380" version="1" comment="libfreebl3-32bit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095381" version="1" comment="libsoftokn3 is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095382" version="1" comment="libsoftokn3-32bit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095383" version="1" comment="mozilla-nss is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095384" version="1" comment="mozilla-nss-32bit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095385" version="1" comment="mozilla-nss-certs is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095386" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095387" version="1" comment="mozilla-nss-devel is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095388" version="1" comment="mozilla-nss-sysinit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095389" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095390" version="1" comment="mozilla-nss-tools is &lt;3.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095630" version="1" comment="MozillaThunderbird is &lt;24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095631" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095632" version="1" comment="MozillaThunderbird-devel is &lt;24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095633" version="1" comment="MozillaThunderbird-translations-common is &lt;24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095634" version="1" comment="MozillaThunderbird-translations-other is &lt;24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095635" version="1" comment="enigmail is &lt;1.6.0+24.5.0-61.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095519" version="1" comment="seamonkey is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095520" version="1" comment="seamonkey-dom-inspector is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095521" version="1" comment="seamonkey-irc is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095522" version="1" comment="seamonkey-translations-common is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095523" version="1" comment="seamonkey-translations-other is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095524" version="1" comment="seamonkey-venkman is &lt;2.26-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095507" version="1" comment="python-eyeD3 is &lt;0.6.18-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095553" version="1" comment="android-tools is &lt;4.2.1_r1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095554" version="1" comment="libopenssl-devel is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095555" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095556" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095557" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095558" version="1" comment="openssl is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095559" version="1" comment="openssl-doc is &lt;1.0.1g-1.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095743" version="1" comment="chromedriver is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095744" version="1" comment="chromium is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095745" version="1" comment="chromium-desktop-gnome is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095746" version="1" comment="chromium-desktop-kde is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095747" version="1" comment="chromium-ffmpegsumo is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095748" version="1" comment="chromium-suid-helper is &lt;34.0.1847.132-1.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095652" version="1" comment="libxml2-2 is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095653" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095654" version="1" comment="libxml2 is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095655" version="1" comment="libxml2-devel is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095656" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095657" version="1" comment="libxml2-doc is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095658" version="1" comment="libxml2-tools is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095659" version="1" comment="python-libxml2 is &lt;2.9.0-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095660" version="1" comment="libvirt is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095661" version="1" comment="libvirt-client is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095662" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095663" version="1" comment="libvirt-devel is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095664" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095665" version="1" comment="libvirt-doc is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095666" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095667" version="1" comment="libvirt-python is &lt;1.0.2-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095780" version="1" comment="kernel-debug is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095781" version="1" comment="kernel-debug-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095782" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095783" version="1" comment="kernel-default is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095784" version="1" comment="kernel-default-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095785" version="1" comment="kernel-default-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095786" version="1" comment="kernel-desktop is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095787" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095788" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095789" version="1" comment="kernel-docs is &lt;3.7.10-1.32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095790" version="1" comment="kernel-ec2 is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095791" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095792" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095793" version="1" comment="kernel-pae is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095794" version="1" comment="kernel-pae-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095795" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095796" version="1" comment="kernel-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095797" version="1" comment="kernel-source is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095798" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095799" version="1" comment="kernel-syms is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095800" version="1" comment="kernel-trace is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095801" version="1" comment="kernel-trace-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095802" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095803" version="1" comment="kernel-vanilla is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095804" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095805" version="1" comment="kernel-xen is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095806" version="1" comment="kernel-xen-base is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009095807" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096013" version="1" comment="strongswan is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096014" version="1" comment="strongswan-doc is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096015" version="1" comment="strongswan-ipsec is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096016" version="1" comment="strongswan-libs0 is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096017" version="1" comment="strongswan-mysql is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096018" version="1" comment="strongswan-nm is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096019" version="1" comment="strongswan-sqlite is &lt;5.0.1-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096196" version="1" comment="perl-LWP-Protocol-https is &lt;6.03-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096077" version="1" comment="mumble is &lt;1.2.6-21.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096078" version="1" comment="mumble-32bit is &lt;1.2.6-21.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096079" version="1" comment="mumble-server is &lt;1.2.6-21.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096080" version="1" comment="libXfont is &lt;1.4.5-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096081" version="1" comment="libXfont-devel is &lt;1.4.5-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096082" version="1" comment="libXfont-devel-32bit is &lt;1.4.5-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096083" version="1" comment="libXfont1 is &lt;1.4.5-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096084" version="1" comment="libXfont1-32bit is &lt;1.4.5-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096094" version="1" comment="postfixadmin is &lt;2.3.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096129" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096130" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096131" version="1" comment="tor is &lt;0.2.4.22-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096141" version="1" comment="libcap-ng-python is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096142" version="1" comment="python-capng is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096143" version="1" comment="libcap-ng is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096144" version="1" comment="libcap-ng-devel is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096145" version="1" comment="libcap-ng-utils is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096146" version="1" comment="libcap-ng0 is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096147" version="1" comment="libcap-ng0-32bit is &lt;0.6.6-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096132" version="1" comment="libgadu is &lt;1.11.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096133" version="1" comment="libgadu-devel is &lt;1.11.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096134" version="1" comment="libgadu3 is &lt;1.11.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096148" version="1" comment="python-lxml is &lt;2.3.4-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096149" version="1" comment="python-lxml-doc is &lt;2.3.4-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096150" version="1" comment="python3-lxml is &lt;2.3.4-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096151" version="1" comment="python3-lxml-doc is &lt;2.3.4-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096095" version="1" comment="libxml2-2 is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096096" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096097" version="1" comment="libxml2 is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096098" version="1" comment="libxml2-devel is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096099" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096100" version="1" comment="libxml2-doc is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096101" version="1" comment="libxml2-tools is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096102" version="1" comment="python-libxml2 is &lt;2.9.0-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096494" version="1" comment="chromedriver is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096495" version="1" comment="chromium is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096496" version="1" comment="chromium-desktop-gnome is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096497" version="1" comment="chromium-desktop-kde is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096498" version="1" comment="chromium-ffmpegsumo is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096499" version="1" comment="chromium-suid-helper is &lt;35.0.1916.114-1.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096500" version="1" comment="ninja is &lt;3.0+git.20130603.0f53fd3-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096501" version="1" comment="apache2-mod_wsgi is &lt;3.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096502" version="1" comment="apache2-mod_wsgi is &lt;3.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096198" version="1" comment="libxml2-2 is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096199" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096200" version="1" comment="libxml2 is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096201" version="1" comment="libxml2-devel is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096202" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096203" version="1" comment="libxml2-doc is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096204" version="1" comment="libxml2-tools is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096205" version="1" comment="python-libxml2 is &lt;2.9.0-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096337" version="1" comment="gnutls is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096338" version="1" comment="libgnutls-devel is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096339" version="1" comment="libgnutls-devel-32bit is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096340" version="1" comment="libgnutls-openssl-devel is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096341" version="1" comment="libgnutls-openssl27 is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096342" version="1" comment="libgnutls28 is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096343" version="1" comment="libgnutls28-32bit is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096344" version="1" comment="libgnutlsxx-devel is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096345" version="1" comment="libgnutlsxx28 is &lt;3.0.28-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096503" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096504" version="1" comment="php5 is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096505" version="1" comment="php5-bcmath is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096506" version="1" comment="php5-bz2 is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096507" version="1" comment="php5-calendar is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096508" version="1" comment="php5-ctype is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096509" version="1" comment="php5-curl is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096510" version="1" comment="php5-dba is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096511" version="1" comment="php5-devel is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096512" version="1" comment="php5-dom is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096513" version="1" comment="php5-enchant is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096514" version="1" comment="php5-exif is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096515" version="1" comment="php5-fastcgi is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096516" version="1" comment="php5-fileinfo is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096517" version="1" comment="php5-fpm is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096518" version="1" comment="php5-ftp is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096519" version="1" comment="php5-gd is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096520" version="1" comment="php5-gettext is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096521" version="1" comment="php5-gmp is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096522" version="1" comment="php5-iconv is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096523" version="1" comment="php5-imap is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096524" version="1" comment="php5-intl is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096525" version="1" comment="php5-json is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096526" version="1" comment="php5-ldap is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096527" version="1" comment="php5-mbstring is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096528" version="1" comment="php5-mcrypt is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096529" version="1" comment="php5-mssql is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096530" version="1" comment="php5-mysql is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096531" version="1" comment="php5-odbc is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096532" version="1" comment="php5-openssl is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096533" version="1" comment="php5-pcntl is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096534" version="1" comment="php5-pdo is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096535" version="1" comment="php5-pear is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096536" version="1" comment="php5-pgsql is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096537" version="1" comment="php5-phar is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096538" version="1" comment="php5-posix is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096539" version="1" comment="php5-pspell is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096540" version="1" comment="php5-readline is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096541" version="1" comment="php5-shmop is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096542" version="1" comment="php5-snmp is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096543" version="1" comment="php5-soap is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096544" version="1" comment="php5-sockets is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096545" version="1" comment="php5-sqlite is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096546" version="1" comment="php5-suhosin is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096547" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096548" version="1" comment="php5-sysvsem is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096549" version="1" comment="php5-sysvshm is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096550" version="1" comment="php5-tidy is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096551" version="1" comment="php5-tokenizer is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096552" version="1" comment="php5-wddx is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096553" version="1" comment="php5-xmlreader is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096554" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096555" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096556" version="1" comment="php5-xsl is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096557" version="1" comment="php5-zip is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096558" version="1" comment="php5-zlib is &lt;5.3.17-3.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096346" version="1" comment="libopenssl-devel is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096347" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096348" version="1" comment="libopenssl1_0_0 is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096349" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096350" version="1" comment="openssl is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096351" version="1" comment="openssl-doc is &lt;1.0.1h-1.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096676" version="1" comment="rmail is &lt;8.14.3-85.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096677" version="1" comment="sendmail is &lt;8.14.5-85.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096678" version="1" comment="sendmail-devel is &lt;8.14.5-85.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096679" version="1" comment="uucp is &lt;1.07-85.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096690" version="1" comment="typo3-cms-4_5 is &lt;4.5.34-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096691" version="1" comment="rxvt-unicode is &lt;9.15-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096692" version="1" comment="libminiupnpc-devel is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096693" version="1" comment="libminiupnpc10 is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096694" version="1" comment="miniupnpc is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096695" version="1" comment="python-miniupnpc is &lt;1.9-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096761" version="1" comment="MozillaFirefox is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096762" version="1" comment="MozillaFirefox-branding-upstream is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096763" version="1" comment="MozillaFirefox-buildsymbols is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096764" version="1" comment="MozillaFirefox-devel is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096765" version="1" comment="MozillaFirefox-translations-common is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096766" version="1" comment="MozillaFirefox-translations-other is &lt;30.0-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096767" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096768" version="1" comment="mozilla-nspr is &lt;4.10.6-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096769" version="1" comment="mozilla-nspr-devel is &lt;4.10.6-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096770" version="1" comment="libfreebl3 is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096771" version="1" comment="libfreebl3-32bit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096772" version="1" comment="libsoftokn3 is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096773" version="1" comment="libsoftokn3-32bit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096774" version="1" comment="mozilla-nss is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096775" version="1" comment="mozilla-nss-32bit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096776" version="1" comment="mozilla-nss-certs is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096777" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096778" version="1" comment="mozilla-nss-devel is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096779" version="1" comment="mozilla-nss-sysinit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096780" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096781" version="1" comment="mozilla-nss-tools is &lt;3.16-1.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097165" version="1" comment="MozillaThunderbird is &lt;24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097166" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097167" version="1" comment="MozillaThunderbird-devel is &lt;24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097168" version="1" comment="MozillaThunderbird-translations-common is &lt;24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097169" version="1" comment="MozillaThunderbird-translations-other is &lt;24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097170" version="1" comment="enigmail is &lt;1.6.0+24.6.0-61.51.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096782" version="1" comment="dbus-1-x11 is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096783" version="1" comment="dbus-1 is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096784" version="1" comment="dbus-1-32bit is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096785" version="1" comment="dbus-1-devel is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096786" version="1" comment="dbus-1-devel-32bit is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096787" version="1" comment="dbus-1-devel-doc is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096788" version="1" comment="libdbus-1-3 is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096789" version="1" comment="libdbus-1-3-32bit is &lt;1.6.8-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096913" version="1" comment="ctdb is &lt;2.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096914" version="1" comment="ctdb-devel is &lt;2.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096915" version="1" comment="ctdb-pcp-pmda is &lt;2.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096790" version="1" comment="castor is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096791" version="1" comment="castor-demo is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096792" version="1" comment="castor-doc is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096793" version="1" comment="castor-javadoc is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096794" version="1" comment="castor-test is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096795" version="1" comment="castor-xml is &lt;0.9.5-317.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097171" version="1" comment="kernel-debug is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097172" version="1" comment="kernel-debug-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097173" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097174" version="1" comment="kernel-default is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097175" version="1" comment="kernel-default-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097176" version="1" comment="kernel-default-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097177" version="1" comment="kernel-desktop is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097178" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097179" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097180" version="1" comment="kernel-docs is &lt;3.7.10-1.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097181" version="1" comment="kernel-ec2 is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097182" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097183" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097184" version="1" comment="kernel-pae is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097185" version="1" comment="kernel-pae-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097186" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097187" version="1" comment="kernel-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097188" version="1" comment="kernel-source is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097189" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097190" version="1" comment="kernel-syms is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097191" version="1" comment="kernel-trace is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097192" version="1" comment="kernel-trace-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097193" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097194" version="1" comment="kernel-vanilla is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097195" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097196" version="1" comment="kernel-xen is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097197" version="1" comment="kernel-xen-base is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097198" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097199" version="1" comment="seamonkey is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097200" version="1" comment="seamonkey-dom-inspector is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097201" version="1" comment="seamonkey-irc is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097202" version="1" comment="seamonkey-translations-common is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097203" version="1" comment="seamonkey-translations-other is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097204" version="1" comment="seamonkey-venkman is &lt;2.26.1-1.53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096916" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096917" version="1" comment="php5 is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096918" version="1" comment="php5-bcmath is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096919" version="1" comment="php5-bz2 is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096920" version="1" comment="php5-calendar is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096921" version="1" comment="php5-ctype is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096922" version="1" comment="php5-curl is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096923" version="1" comment="php5-dba is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096924" version="1" comment="php5-devel is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096925" version="1" comment="php5-dom is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096926" version="1" comment="php5-enchant is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096927" version="1" comment="php5-exif is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096928" version="1" comment="php5-fastcgi is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096929" version="1" comment="php5-fileinfo is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096930" version="1" comment="php5-fpm is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096931" version="1" comment="php5-ftp is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096932" version="1" comment="php5-gd is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096933" version="1" comment="php5-gettext is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096934" version="1" comment="php5-gmp is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096935" version="1" comment="php5-iconv is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096936" version="1" comment="php5-imap is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096937" version="1" comment="php5-intl is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096938" version="1" comment="php5-json is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096939" version="1" comment="php5-ldap is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096940" version="1" comment="php5-mbstring is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096941" version="1" comment="php5-mcrypt is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096942" version="1" comment="php5-mssql is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096943" version="1" comment="php5-mysql is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096944" version="1" comment="php5-odbc is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096945" version="1" comment="php5-openssl is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096946" version="1" comment="php5-pcntl is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096947" version="1" comment="php5-pdo is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096948" version="1" comment="php5-pear is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096949" version="1" comment="php5-pgsql is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096950" version="1" comment="php5-phar is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096951" version="1" comment="php5-posix is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096952" version="1" comment="php5-pspell is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096953" version="1" comment="php5-readline is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096954" version="1" comment="php5-shmop is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096955" version="1" comment="php5-snmp is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096956" version="1" comment="php5-soap is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096957" version="1" comment="php5-sockets is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096958" version="1" comment="php5-sqlite is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096959" version="1" comment="php5-suhosin is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096960" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096961" version="1" comment="php5-sysvsem is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096962" version="1" comment="php5-sysvshm is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096963" version="1" comment="php5-tidy is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096964" version="1" comment="php5-tokenizer is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096965" version="1" comment="php5-wddx is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096966" version="1" comment="php5-xmlreader is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096967" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096968" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096969" version="1" comment="php5-xsl is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096970" version="1" comment="php5-zip is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009096971" version="1" comment="php5-zlib is &lt;5.3.17-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097205" version="1" comment="xalan-j2 is &lt;2.7.0-259.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097206" version="1" comment="xalan-j2-demo is &lt;2.7.0-259.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097207" version="1" comment="xalan-j2-javadoc is &lt;2.7.0-259.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097208" version="1" comment="xalan-j2-manual is &lt;2.7.0-259.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097209" version="1" comment="xalan-j2-xsltc is &lt;2.7.0-259.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097210" version="1" comment="samba-doc is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097211" version="1" comment="libnetapi-devel is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097212" version="1" comment="libnetapi0 is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097213" version="1" comment="libsmbclient-devel is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097214" version="1" comment="libsmbclient0 is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097215" version="1" comment="libsmbclient0-32bit is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097216" version="1" comment="libsmbsharemodes-devel is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097217" version="1" comment="libsmbsharemodes0 is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097218" version="1" comment="libwbclient-devel is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097219" version="1" comment="libwbclient0 is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097220" version="1" comment="libwbclient0-32bit is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097221" version="1" comment="samba is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097222" version="1" comment="samba-32bit is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097223" version="1" comment="samba-client is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097224" version="1" comment="samba-client-32bit is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097225" version="1" comment="samba-devel is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097226" version="1" comment="samba-krb-printing is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097227" version="1" comment="samba-winbind is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097228" version="1" comment="samba-winbind-32bit is &lt;3.6.12-59.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097229" version="1" comment="freerdp is &lt;1.0.2-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097230" version="1" comment="freerdp-devel is &lt;1.0.2-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097231" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097232" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097488" version="1" comment="memcached is &lt;1.4.20-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097489" version="1" comment="gpg2 is &lt;2.0.19-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097490" version="1" comment="gpg2-lang is &lt;2.0.19-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097806" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097807" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097808" version="1" comment="python-base is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097809" version="1" comment="python-base-32bit is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097810" version="1" comment="python-devel is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097811" version="1" comment="python-xml is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097812" version="1" comment="python-doc is &lt;2.7-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097813" version="1" comment="python-doc-pdf is &lt;2.7-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097814" version="1" comment="python is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097815" version="1" comment="python-32bit is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097816" version="1" comment="python-curses is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097817" version="1" comment="python-demo is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097818" version="1" comment="python-gdbm is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097819" version="1" comment="python-idle is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097820" version="1" comment="python-tk is &lt;2.7.3-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097821" version="1" comment="libpython3_3m1_0 is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097822" version="1" comment="libpython3_3m1_0-32bit is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097823" version="1" comment="python3-base is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097824" version="1" comment="python3-base-32bit is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097825" version="1" comment="python3-devel is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097826" version="1" comment="python3-idle is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097827" version="1" comment="python3-testsuite is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097828" version="1" comment="python3-tools is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097829" version="1" comment="python3-doc is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097830" version="1" comment="python3-doc-pdf is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097831" version="1" comment="python3 is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097832" version="1" comment="python3-32bit is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097833" version="1" comment="python3-curses is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097834" version="1" comment="python3-dbm is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009097835" version="1" comment="python3-tk is &lt;3.3.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098175" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098176" version="1" comment="php5 is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098177" version="1" comment="php5-bcmath is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098178" version="1" comment="php5-bz2 is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098179" version="1" comment="php5-calendar is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098180" version="1" comment="php5-ctype is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098181" version="1" comment="php5-curl is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098182" version="1" comment="php5-dba is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098183" version="1" comment="php5-devel is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098184" version="1" comment="php5-dom is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098185" version="1" comment="php5-enchant is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098186" version="1" comment="php5-exif is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098187" version="1" comment="php5-fastcgi is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098188" version="1" comment="php5-fileinfo is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098189" version="1" comment="php5-fpm is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098190" version="1" comment="php5-ftp is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098191" version="1" comment="php5-gd is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098192" version="1" comment="php5-gettext is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098193" version="1" comment="php5-gmp is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098194" version="1" comment="php5-iconv is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098195" version="1" comment="php5-imap is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098196" version="1" comment="php5-intl is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098197" version="1" comment="php5-json is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098198" version="1" comment="php5-ldap is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098199" version="1" comment="php5-mbstring is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098200" version="1" comment="php5-mcrypt is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098201" version="1" comment="php5-mssql is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098202" version="1" comment="php5-mysql is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098203" version="1" comment="php5-odbc is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098204" version="1" comment="php5-openssl is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098205" version="1" comment="php5-pcntl is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098206" version="1" comment="php5-pdo is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098207" version="1" comment="php5-pear is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098208" version="1" comment="php5-pgsql is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098209" version="1" comment="php5-phar is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098210" version="1" comment="php5-posix is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098211" version="1" comment="php5-pspell is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098212" version="1" comment="php5-readline is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098213" version="1" comment="php5-shmop is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098214" version="1" comment="php5-snmp is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098215" version="1" comment="php5-soap is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098216" version="1" comment="php5-sockets is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098217" version="1" comment="php5-sqlite is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098218" version="1" comment="php5-suhosin is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098219" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098220" version="1" comment="php5-sysvsem is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098221" version="1" comment="php5-sysvshm is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098222" version="1" comment="php5-tidy is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098223" version="1" comment="php5-tokenizer is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098224" version="1" comment="php5-wddx is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098225" version="1" comment="php5-xmlreader is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098226" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098227" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098228" version="1" comment="php5-xsl is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098229" version="1" comment="php5-zip is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098230" version="1" comment="php5-zlib is &lt;5.3.17-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098231" version="1" comment="liblzo2-2 is &lt;2.06-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098232" version="1" comment="liblzo2-2-32bit is &lt;2.06-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098233" version="1" comment="lzo is &lt;2.06-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098234" version="1" comment="lzo-devel is &lt;2.06-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098235" version="1" comment="lzo-devel-32bit is &lt;2.06-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098236" version="1" comment="dbus-1-x11 is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098237" version="1" comment="dbus-1 is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098238" version="1" comment="dbus-1-32bit is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098239" version="1" comment="dbus-1-devel is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098240" version="1" comment="dbus-1-devel-32bit is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098241" version="1" comment="dbus-1-devel-doc is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098242" version="1" comment="libdbus-1-3 is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098243" version="1" comment="libdbus-1-3-32bit is &lt;1.6.8-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098244" version="1" comment="eet is &lt;1.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098245" version="1" comment="eet-devel is &lt;1.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098246" version="1" comment="eet-doc-html is &lt;1.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098247" version="1" comment="eet-examples is &lt;1.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098248" version="1" comment="libeet1 is &lt;1.7.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099056" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099057" version="1" comment="php5 is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099058" version="1" comment="php5-bcmath is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099059" version="1" comment="php5-bz2 is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099060" version="1" comment="php5-calendar is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099061" version="1" comment="php5-ctype is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099062" version="1" comment="php5-curl is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099063" version="1" comment="php5-dba is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099064" version="1" comment="php5-devel is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099065" version="1" comment="php5-dom is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099066" version="1" comment="php5-enchant is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099067" version="1" comment="php5-exif is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099068" version="1" comment="php5-fastcgi is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099069" version="1" comment="php5-fileinfo is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099070" version="1" comment="php5-fpm is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099071" version="1" comment="php5-ftp is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099072" version="1" comment="php5-gd is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099073" version="1" comment="php5-gettext is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099074" version="1" comment="php5-gmp is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099075" version="1" comment="php5-iconv is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099076" version="1" comment="php5-imap is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099077" version="1" comment="php5-intl is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099078" version="1" comment="php5-json is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099079" version="1" comment="php5-ldap is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099080" version="1" comment="php5-mbstring is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099081" version="1" comment="php5-mcrypt is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099082" version="1" comment="php5-mssql is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099083" version="1" comment="php5-mysql is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099084" version="1" comment="php5-odbc is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099085" version="1" comment="php5-openssl is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099086" version="1" comment="php5-pcntl is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099087" version="1" comment="php5-pdo is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099088" version="1" comment="php5-pear is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099089" version="1" comment="php5-pgsql is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099090" version="1" comment="php5-phar is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099091" version="1" comment="php5-posix is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099092" version="1" comment="php5-pspell is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099093" version="1" comment="php5-readline is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099094" version="1" comment="php5-shmop is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099095" version="1" comment="php5-snmp is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099096" version="1" comment="php5-soap is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099097" version="1" comment="php5-sockets is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099098" version="1" comment="php5-sqlite is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099099" version="1" comment="php5-suhosin is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099100" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099101" version="1" comment="php5-sysvsem is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099102" version="1" comment="php5-sysvshm is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099103" version="1" comment="php5-tidy is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099104" version="1" comment="php5-tokenizer is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099105" version="1" comment="php5-wddx is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099106" version="1" comment="php5-xmlreader is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099107" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099108" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099109" version="1" comment="php5-xsl is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099110" version="1" comment="php5-zip is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099111" version="1" comment="php5-zlib is &lt;5.3.17-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099112" version="1" comment="ntp is &lt;4.2.6p5-9.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099113" version="1" comment="ntp-doc is &lt;4.2.6p5-9.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099206" version="1" comment="kernel-debug is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099207" version="1" comment="kernel-debug-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099208" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099209" version="1" comment="kernel-default is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099210" version="1" comment="kernel-default-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099211" version="1" comment="kernel-default-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099212" version="1" comment="kernel-desktop is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099213" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099214" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099215" version="1" comment="kernel-docs is &lt;3.7.10-1.40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099216" version="1" comment="kernel-ec2 is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099217" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099218" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099219" version="1" comment="kernel-pae is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099220" version="1" comment="kernel-pae-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099221" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099222" version="1" comment="kernel-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099223" version="1" comment="kernel-source is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099224" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099225" version="1" comment="kernel-syms is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099226" version="1" comment="kernel-trace is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099227" version="1" comment="kernel-trace-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099228" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099229" version="1" comment="kernel-vanilla is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099230" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099231" version="1" comment="kernel-xen is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099232" version="1" comment="kernel-xen-base is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099233" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098967" version="1" comment="MozillaFirefox is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098968" version="1" comment="MozillaFirefox-branding-upstream is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098969" version="1" comment="MozillaFirefox-buildsymbols is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098970" version="1" comment="MozillaFirefox-devel is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098971" version="1" comment="MozillaFirefox-translations-common is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098972" version="1" comment="MozillaFirefox-translations-other is &lt;31.0-1.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098973" version="1" comment="libfreebl3 is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098974" version="1" comment="libfreebl3-32bit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098975" version="1" comment="libsoftokn3 is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098976" version="1" comment="libsoftokn3-32bit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098977" version="1" comment="mozilla-nss is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098978" version="1" comment="mozilla-nss-32bit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098979" version="1" comment="mozilla-nss-certs is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098980" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098981" version="1" comment="mozilla-nss-devel is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098982" version="1" comment="mozilla-nss-sysinit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098983" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098984" version="1" comment="mozilla-nss-tools is &lt;3.16.3-1.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099259" version="1" comment="MozillaThunderbird is &lt;24.7.0-61.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099260" version="1" comment="MozillaThunderbird-buildsymbols is &lt;24.7.0-61.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099261" version="1" comment="MozillaThunderbird-devel is &lt;24.7.0-61.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099262" version="1" comment="MozillaThunderbird-translations-common is &lt;24.7.0-61.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099263" version="1" comment="MozillaThunderbird-translations-other is &lt;24.7.0-61.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099264" version="1" comment="enigmail is &lt;1.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099114" version="1" comment="libpulse-devel is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099115" version="1" comment="libpulse-mainloop-glib0 is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099116" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099117" version="1" comment="libpulse0 is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099118" version="1" comment="libpulse0-32bit is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099119" version="1" comment="pulseaudio is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099120" version="1" comment="pulseaudio-esound-compat is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099121" version="1" comment="pulseaudio-gdm-hooks is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099122" version="1" comment="pulseaudio-lang is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099123" version="1" comment="pulseaudio-module-bluetooth is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099124" version="1" comment="pulseaudio-module-gconf is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099125" version="1" comment="pulseaudio-module-jack is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099126" version="1" comment="pulseaudio-module-lirc is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099127" version="1" comment="pulseaudio-module-x11 is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099128" version="1" comment="pulseaudio-module-zeroconf is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099129" version="1" comment="pulseaudio-utils is &lt;3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099265" version="1" comment="exim is &lt;4.83-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099266" version="1" comment="eximon is &lt;4.83-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099267" version="1" comment="eximstats-html is &lt;4.83-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099268" version="1" comment="chromedriver is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099269" version="1" comment="chromium is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099270" version="1" comment="chromium-desktop-gnome is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099271" version="1" comment="chromium-desktop-kde is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099272" version="1" comment="chromium-ffmpegsumo is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099273" version="1" comment="chromium-suid-helper is &lt;36.0.1985.125-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099274" version="1" comment="krb5-doc is &lt;1.10.2-10.26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099275" version="1" comment="krb5-mini is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099276" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099277" version="1" comment="krb5 is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099278" version="1" comment="krb5-32bit is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099279" version="1" comment="krb5-client is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099280" version="1" comment="krb5-devel is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099281" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099282" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099283" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099284" version="1" comment="krb5-server is &lt;1.10.2-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099285" version="1" comment="jbigkit is &lt;2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099286" version="1" comment="libjbig-devel is &lt;2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099287" version="1" comment="libjbig-devel-32bit is &lt;2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099288" version="1" comment="libjbig2 is &lt;2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099289" version="1" comment="libjbig2-32bit is &lt;2.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099290" version="1" comment="elfutils is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099291" version="1" comment="libasm-devel is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099292" version="1" comment="libasm1 is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099293" version="1" comment="libasm1-32bit is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099294" version="1" comment="libdw-devel is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099295" version="1" comment="libdw1 is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099296" version="1" comment="libdw1-32bit is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099297" version="1" comment="libebl-devel is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099298" version="1" comment="libebl1 is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099299" version="1" comment="libebl1-32bit is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099300" version="1" comment="libelf-devel is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099301" version="1" comment="libelf-devel-32bit is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099302" version="1" comment="libelf1 is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099303" version="1" comment="libelf1-32bit is &lt;0.155-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099304" version="1" comment="tor is &lt;0.2.4.23-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099588" version="1" comment="apache2-mod_security2 is &lt;2.7.5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099589" version="1" comment="apache2 is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099590" version="1" comment="apache2-devel is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099591" version="1" comment="apache2-doc is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099592" version="1" comment="apache2-event is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099593" version="1" comment="apache2-example-pages is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099594" version="1" comment="apache2-itk is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099595" version="1" comment="apache2-prefork is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099596" version="1" comment="apache2-utils is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099597" version="1" comment="apache2-worker is &lt;2.2.22-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099598" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099599" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099600" version="1" comment="python-base is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099601" version="1" comment="python-base-32bit is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099602" version="1" comment="python-devel is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099603" version="1" comment="python-xml is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099604" version="1" comment="python-doc is &lt;2.7-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099605" version="1" comment="python-doc-pdf is &lt;2.7-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099606" version="1" comment="python is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099607" version="1" comment="python-32bit is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099608" version="1" comment="python-curses is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099609" version="1" comment="python-demo is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099610" version="1" comment="python-gdbm is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099611" version="1" comment="python-idle is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099612" version="1" comment="python-tk is &lt;2.7.3-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099893" version="1" comment="libpython3_3m1_0 is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099894" version="1" comment="libpython3_3m1_0-32bit is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099895" version="1" comment="python3-base is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099896" version="1" comment="python3-base-32bit is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099897" version="1" comment="python3-devel is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099898" version="1" comment="python3-idle is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099899" version="1" comment="python3-testsuite is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099900" version="1" comment="python3-tools is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099901" version="1" comment="python3-doc is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099902" version="1" comment="python3-doc-pdf is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099903" version="1" comment="python3 is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099904" version="1" comment="python3-32bit is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099905" version="1" comment="python3-curses is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099906" version="1" comment="python3-dbm is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099907" version="1" comment="python3-tk is &lt;3.3.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099613" version="1" comment="gpgme is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099614" version="1" comment="libgpgme-devel is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099615" version="1" comment="libgpgme11 is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099616" version="1" comment="libgpgme11-32bit is &lt;1.3.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099617" version="1" comment="krb5-doc is &lt;1.10.2-10.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099618" version="1" comment="krb5-mini is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099619" version="1" comment="krb5-mini-devel is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099620" version="1" comment="krb5 is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099621" version="1" comment="krb5-32bit is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099622" version="1" comment="krb5-client is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099623" version="1" comment="krb5-devel is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099624" version="1" comment="krb5-devel-32bit is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099625" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099626" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099627" version="1" comment="krb5-server is &lt;1.10.2-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099804" version="1" comment="libopenssl-devel is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099805" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099806" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099807" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099808" version="1" comment="openssl is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099809" version="1" comment="openssl-doc is &lt;1.0.1i-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099851" version="1" comment="libserf-1-0 is &lt;1.1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099852" version="1" comment="libserf is &lt;1.1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099853" version="1" comment="libserf-devel is &lt;1.1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099854" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099855" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099856" version="1" comment="subversion is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099857" version="1" comment="subversion-bash-completion is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099858" version="1" comment="subversion-devel is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099859" version="1" comment="subversion-perl is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099860" version="1" comment="subversion-python is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099861" version="1" comment="subversion-server is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099862" version="1" comment="subversion-tools is &lt;1.7.18-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099863" version="1" comment="IPython is &lt;0.13.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099864" version="1" comment="IPython-doc is &lt;0.13.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099865" version="1" comment="python3-IPython is &lt;0.13.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099866" version="1" comment="libgcrypt is &lt;1.5.4-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099867" version="1" comment="libgcrypt-devel is &lt;1.5.4-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099868" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.4-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099869" version="1" comment="libgcrypt11 is &lt;1.5.4-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099870" version="1" comment="libgcrypt11-32bit is &lt;1.5.4-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099908" version="1" comment="phpMyAdmin is &lt;4.1.14.3-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100031" version="1" comment="glibc-testsuite is &lt;2.17-4.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100032" version="1" comment="glibc-utils is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100033" version="1" comment="glibc-utils-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100034" version="1" comment="glibc is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100035" version="1" comment="glibc-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100036" version="1" comment="glibc-devel is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100037" version="1" comment="glibc-devel-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100038" version="1" comment="glibc-devel-static is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100039" version="1" comment="glibc-devel-static-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100040" version="1" comment="glibc-extra is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100041" version="1" comment="glibc-i18ndata is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100042" version="1" comment="glibc-info is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100043" version="1" comment="glibc-locale is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100044" version="1" comment="glibc-locale-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100045" version="1" comment="glibc-obsolete is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100046" version="1" comment="glibc-profile is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100047" version="1" comment="glibc-profile-32bit is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100048" version="1" comment="nscd is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100049" version="1" comment="glibc-html is &lt;2.17-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099943" version="1" comment="enigmail is &lt;1.7.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100165" version="1" comment="libreoffice-branding-upstream is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100166" version="1" comment="libreoffice-help-en-US is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100167" version="1" comment="libreoffice-help-ast is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100168" version="1" comment="libreoffice-help-bg is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100169" version="1" comment="libreoffice-help-ca is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100170" version="1" comment="libreoffice-help-cs is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100171" version="1" comment="libreoffice-help-da is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100172" version="1" comment="libreoffice-help-de is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100173" version="1" comment="libreoffice-help-en-GB is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100174" version="1" comment="libreoffice-help-group1 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100175" version="1" comment="libreoffice-help-el is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100176" version="1" comment="libreoffice-help-en-ZA is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100177" version="1" comment="libreoffice-help-es is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100178" version="1" comment="libreoffice-help-et is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100179" version="1" comment="libreoffice-help-eu is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100180" version="1" comment="libreoffice-help-fi is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100181" version="1" comment="libreoffice-help-fr is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100182" version="1" comment="libreoffice-help-group2 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100183" version="1" comment="libreoffice-help-gl is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100184" version="1" comment="libreoffice-help-group3 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100185" version="1" comment="libreoffice-help-gu-IN is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100186" version="1" comment="libreoffice-help-hi-IN is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100187" version="1" comment="libreoffice-help-hu is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100188" version="1" comment="libreoffice-help-it is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100189" version="1" comment="libreoffice-help-ja is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100190" version="1" comment="libreoffice-help-km is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100191" version="1" comment="libreoffice-help-group4 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100192" version="1" comment="libreoffice-help-ko is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100193" version="1" comment="libreoffice-help-mk is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100194" version="1" comment="libreoffice-help-nb is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100195" version="1" comment="libreoffice-help-nl is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100196" version="1" comment="libreoffice-help-pl is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100197" version="1" comment="libreoffice-help-pt is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100198" version="1" comment="libreoffice-help-pt-BR is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100199" version="1" comment="libreoffice-help-group5 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100200" version="1" comment="libreoffice-help-ru is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100201" version="1" comment="libreoffice-help-sk is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100202" version="1" comment="libreoffice-help-sl is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100203" version="1" comment="libreoffice-help-sv is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100204" version="1" comment="libreoffice-help-tr is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100205" version="1" comment="libreoffice-help-vi is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100206" version="1" comment="libreoffice-help-zh-CN is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100207" version="1" comment="libreoffice-help-zh-TW is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100208" version="1" comment="libreoffice-icon-theme-crystal is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100209" version="1" comment="libreoffice-icon-theme-galaxy is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100210" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100211" version="1" comment="libreoffice-icon-theme-oxygen is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100212" version="1" comment="libreoffice-icon-theme-tango is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100213" version="1" comment="libreoffice-icon-themes is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100214" version="1" comment="libreoffice-l10n is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100215" version="1" comment="libreoffice-l10n-af is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100216" version="1" comment="libreoffice-l10n-am is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100217" version="1" comment="libreoffice-l10n-ar is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100218" version="1" comment="libreoffice-l10n-as is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100219" version="1" comment="libreoffice-l10n-ast is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100220" version="1" comment="libreoffice-l10n-be-BY is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100221" version="1" comment="libreoffice-l10n-bg is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100222" version="1" comment="libreoffice-l10n-br is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100223" version="1" comment="libreoffice-l10n-ca is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100224" version="1" comment="libreoffice-l10n-cs is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100225" version="1" comment="libreoffice-l10n-cy is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100226" version="1" comment="libreoffice-l10n-da is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100227" version="1" comment="libreoffice-l10n-de is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100228" version="1" comment="libreoffice-l10n-el is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100229" version="1" comment="libreoffice-l10n-en-GB is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100230" version="1" comment="libreoffice-l10n-en-ZA is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100231" version="1" comment="libreoffice-l10n-eo is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100232" version="1" comment="libreoffice-l10n-es is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100233" version="1" comment="libreoffice-l10n-et is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100234" version="1" comment="libreoffice-l10n-eu is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100235" version="1" comment="libreoffice-l10n-fi is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100236" version="1" comment="libreoffice-l10n-fr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100237" version="1" comment="libreoffice-l10n-ga is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100238" version="1" comment="libreoffice-l10n-gd is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100239" version="1" comment="libreoffice-l10n-gl is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100240" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100241" version="1" comment="libreoffice-l10n-he is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100242" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100243" version="1" comment="libreoffice-l10n-hr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100244" version="1" comment="libreoffice-l10n-hu is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100245" version="1" comment="libreoffice-l10n-id is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100246" version="1" comment="libreoffice-l10n-is is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100247" version="1" comment="libreoffice-l10n-it is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100248" version="1" comment="libreoffice-l10n-ja is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100249" version="1" comment="libreoffice-l10n-ka is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100250" version="1" comment="libreoffice-l10n-km is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100251" version="1" comment="libreoffice-l10n-kn is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100252" version="1" comment="libreoffice-l10n-ko is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100253" version="1" comment="libreoffice-l10n-lt is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100254" version="1" comment="libreoffice-l10n-mk is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100255" version="1" comment="libreoffice-l10n-ml is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100256" version="1" comment="libreoffice-l10n-mr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100257" version="1" comment="libreoffice-l10n-nb is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100258" version="1" comment="libreoffice-l10n-nl is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100259" version="1" comment="libreoffice-l10n-nn is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100260" version="1" comment="libreoffice-l10n-nr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100261" version="1" comment="libreoffice-l10n-om is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100262" version="1" comment="libreoffice-l10n-or is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100263" version="1" comment="libreoffice-l10n-pa-IN is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100264" version="1" comment="libreoffice-l10n-pl is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100265" version="1" comment="libreoffice-l10n-pt is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100266" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100267" version="1" comment="libreoffice-l10n-ro is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100268" version="1" comment="libreoffice-l10n-ru is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100269" version="1" comment="libreoffice-l10n-rw is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100270" version="1" comment="libreoffice-l10n-sh is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100271" version="1" comment="libreoffice-l10n-sk is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100272" version="1" comment="libreoffice-l10n-sl is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100273" version="1" comment="libreoffice-l10n-sr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100274" version="1" comment="libreoffice-l10n-ss is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100275" version="1" comment="libreoffice-l10n-st is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100276" version="1" comment="libreoffice-l10n-sv is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100277" version="1" comment="libreoffice-l10n-ta is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100278" version="1" comment="libreoffice-l10n-te is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100279" version="1" comment="libreoffice-l10n-tg is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100280" version="1" comment="libreoffice-l10n-th is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100281" version="1" comment="libreoffice-l10n-tr is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100282" version="1" comment="libreoffice-l10n-ts is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100283" version="1" comment="libreoffice-l10n-ug is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100284" version="1" comment="libreoffice-l10n-uk is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100285" version="1" comment="libreoffice-l10n-ve is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100286" version="1" comment="libreoffice-l10n-vi is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100287" version="1" comment="libreoffice-l10n-xh is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100288" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100289" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100290" version="1" comment="libreoffice-l10n-zu is &lt;3.6.3.2.4-2.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100291" version="1" comment="libreoffice is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100292" version="1" comment="libreoffice-base is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100293" version="1" comment="libreoffice-base-drivers-mysql is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100294" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100295" version="1" comment="libreoffice-base-extensions is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100296" version="1" comment="libreoffice-calc is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100297" version="1" comment="libreoffice-calc-extensions is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100298" version="1" comment="libreoffice-draw is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100299" version="1" comment="libreoffice-draw-extensions is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100300" version="1" comment="libreoffice-filters-optional is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100301" version="1" comment="libreoffice-gnome is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100302" version="1" comment="libreoffice-icon-themes-prebuilt is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100303" version="1" comment="libreoffice-impress is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100304" version="1" comment="libreoffice-impress-extensions is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100305" version="1" comment="libreoffice-kde is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100306" version="1" comment="libreoffice-kde4 is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100307" version="1" comment="libreoffice-l10n-prebuilt is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100308" version="1" comment="libreoffice-mailmerge is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100309" version="1" comment="libreoffice-math is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100310" version="1" comment="libreoffice-officebean is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100311" version="1" comment="libreoffice-pyuno is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100312" version="1" comment="libreoffice-sdk is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100313" version="1" comment="libreoffice-sdk-doc is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100314" version="1" comment="libreoffice-writer is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100315" version="1" comment="libreoffice-writer-extensions is &lt;3.6.3.2.4-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099944" version="1" comment="MozillaFirefox is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099945" version="1" comment="MozillaFirefox-branding-upstream is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099946" version="1" comment="MozillaFirefox-buildsymbols is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099947" version="1" comment="MozillaFirefox-devel is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099948" version="1" comment="MozillaFirefox-translations-common is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099949" version="1" comment="MozillaFirefox-translations-other is &lt;31.1.0-1.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099950" version="1" comment="libfreebl3 is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099951" version="1" comment="libfreebl3-32bit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099952" version="1" comment="libsoftokn3 is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099953" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099954" version="1" comment="mozilla-nss is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099955" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099956" version="1" comment="mozilla-nss-certs is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099957" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099958" version="1" comment="mozilla-nss-devel is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099959" version="1" comment="mozilla-nss-sysinit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099960" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099961" version="1" comment="mozilla-nss-tools is &lt;3.16.4-1.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100016" version="1" comment="libsnmp30-32bit is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100017" version="1" comment="libsnmp30 is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100018" version="1" comment="net-snmp is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100019" version="1" comment="net-snmp-devel-32bit is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100020" version="1" comment="net-snmp-devel is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100021" version="1" comment="perl-SNMP is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100022" version="1" comment="snmp-mibs is &lt;5.7.2-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099962" version="1" comment="MozillaThunderbird is &lt;31.1.0-61.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099963" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.1.0-61.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099964" version="1" comment="MozillaThunderbird-devel is &lt;31.1.0-61.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099965" version="1" comment="MozillaThunderbird-translations-common is &lt;31.1.0-61.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099966" version="1" comment="MozillaThunderbird-translations-other is &lt;31.1.0-61.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100734" version="1" comment="chromedriver is &lt;37.0.2062.94-1.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100735" version="1" comment="chromium is &lt;37.0.2062.94-1.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100736" version="1" comment="chromium-desktop-gnome is &lt;37.0.2062.94-1.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100737" version="1" comment="chromium-desktop-kde is &lt;37.0.2062.94-1.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100738" version="1" comment="chromium-ffmpegsumo is &lt;37.0.2062.94-1.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100050" version="1" comment="procmail is &lt;3.22-260.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100680" version="1" comment="squid is &lt;3.2.11-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100467" version="1" comment="python-django is &lt;1.4.15-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100468" version="1" comment="ppp is &lt;2.4.5-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100469" version="1" comment="ppp-devel is &lt;2.4.5-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100470" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100471" version="1" comment="php5 is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100472" version="1" comment="php5-bcmath is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100473" version="1" comment="php5-bz2 is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100474" version="1" comment="php5-calendar is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100475" version="1" comment="php5-ctype is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100476" version="1" comment="php5-curl is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100477" version="1" comment="php5-dba is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100478" version="1" comment="php5-devel is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100479" version="1" comment="php5-dom is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100480" version="1" comment="php5-enchant is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100481" version="1" comment="php5-exif is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100482" version="1" comment="php5-fastcgi is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100483" version="1" comment="php5-fileinfo is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100484" version="1" comment="php5-fpm is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100485" version="1" comment="php5-ftp is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100486" version="1" comment="php5-gd is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100487" version="1" comment="php5-gettext is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100488" version="1" comment="php5-gmp is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100489" version="1" comment="php5-iconv is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100490" version="1" comment="php5-imap is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100491" version="1" comment="php5-intl is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100492" version="1" comment="php5-json is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100493" version="1" comment="php5-ldap is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100494" version="1" comment="php5-mbstring is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100495" version="1" comment="php5-mcrypt is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100496" version="1" comment="php5-mssql is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100497" version="1" comment="php5-mysql is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100498" version="1" comment="php5-odbc is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100499" version="1" comment="php5-openssl is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100500" version="1" comment="php5-pcntl is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100501" version="1" comment="php5-pdo is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100502" version="1" comment="php5-pear is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100503" version="1" comment="php5-pgsql is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100504" version="1" comment="php5-phar is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100505" version="1" comment="php5-posix is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100506" version="1" comment="php5-pspell is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100507" version="1" comment="php5-readline is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100508" version="1" comment="php5-shmop is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100509" version="1" comment="php5-snmp is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100510" version="1" comment="php5-soap is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100511" version="1" comment="php5-sockets is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100512" version="1" comment="php5-sqlite is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100513" version="1" comment="php5-suhosin is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100514" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100515" version="1" comment="php5-sysvsem is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100516" version="1" comment="php5-sysvshm is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100517" version="1" comment="php5-tidy is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100518" version="1" comment="php5-tokenizer is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100519" version="1" comment="php5-wddx is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100520" version="1" comment="php5-xmlreader is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100521" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100522" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100523" version="1" comment="php5-xsl is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100524" version="1" comment="php5-zip is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100525" version="1" comment="php5-zlib is &lt;5.3.17-3.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100587" version="1" comment="curl is &lt;7.28.1-4.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100588" version="1" comment="libcurl-devel is &lt;7.28.1-4.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100589" version="1" comment="libcurl4-32bit is &lt;7.28.1-4.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100590" version="1" comment="libcurl4 is &lt;7.28.1-4.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100681" version="1" comment="liblua5_2-32bit is &lt;5.2.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100682" version="1" comment="liblua5_2 is &lt;5.2.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100683" version="1" comment="lua is &lt;5.2.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100684" version="1" comment="lua-devel is &lt;5.2.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100685" version="1" comment="lua-doc is &lt;5.2.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100739" version="1" comment="phpMyAdmin is &lt;4.1.14.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100740" version="1" comment="dbus-1-x11 is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100741" version="1" comment="dbus-1 is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100742" version="1" comment="dbus-1-32bit is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100743" version="1" comment="dbus-1-devel is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100744" version="1" comment="dbus-1-devel-32bit is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100745" version="1" comment="dbus-1-devel-doc is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100746" version="1" comment="libdbus-1-3 is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100747" version="1" comment="libdbus-1-3-32bit is &lt;1.6.24-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100824" version="1" comment="wireshark is &lt;1.10.10-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100825" version="1" comment="wireshark-devel is &lt;1.10.10-1.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100831" version="1" comment="xen is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100832" version="1" comment="xen-devel is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100833" version="1" comment="xen-kmp-default is &lt;4.2.4_04_k3.7.10_1.40-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100834" version="1" comment="xen-kmp-desktop is &lt;4.2.4_04_k3.7.10_1.40-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100835" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_k3.7.10_1.40-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100836" version="1" comment="xen-libs-32bit is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100837" version="1" comment="xen-libs is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100838" version="1" comment="xen-tools-domU is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100839" version="1" comment="xen-doc-html is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100840" version="1" comment="xen-doc-pdf is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100841" version="1" comment="xen-tools is &lt;4.2.4_04-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100748" version="1" comment="bash is &lt;4.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100749" version="1" comment="bash-devel is &lt;4.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100750" version="1" comment="bash-doc is &lt;4.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100751" version="1" comment="bash-lang is &lt;4.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100752" version="1" comment="bash-loadables is &lt;4.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100753" version="1" comment="libreadline6-32bit is &lt;6.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100754" version="1" comment="libreadline6 is &lt;6.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100755" version="1" comment="readline-devel-32bit is &lt;6.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100756" version="1" comment="readline-devel is &lt;6.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100757" version="1" comment="readline-doc is &lt;6.2-61.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100758" version="1" comment="libfreebl3 is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100759" version="1" comment="libfreebl3-32bit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100760" version="1" comment="libsoftokn3 is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100761" version="1" comment="libsoftokn3-32bit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100762" version="1" comment="mozilla-nss is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100763" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100764" version="1" comment="mozilla-nss-certs is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100765" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100766" version="1" comment="mozilla-nss-devel is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100767" version="1" comment="mozilla-nss-sysinit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100768" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100769" version="1" comment="mozilla-nss-tools is &lt;3.16.5-1.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100770" version="1" comment="bash is &lt;4.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100771" version="1" comment="bash-devel is &lt;4.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100772" version="1" comment="bash-doc is &lt;4.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100773" version="1" comment="bash-lang is &lt;4.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100774" version="1" comment="bash-loadables is &lt;4.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100775" version="1" comment="libreadline6-32bit is &lt;6.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100776" version="1" comment="libreadline6 is &lt;6.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100777" version="1" comment="readline-devel-32bit is &lt;6.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100778" version="1" comment="readline-devel is &lt;6.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100779" version="1" comment="readline-doc is &lt;6.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100842" version="1" comment="phpMyAdmin is &lt;4.1.14.5-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100855" version="1" comment="libvirt is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100856" version="1" comment="libvirt-client is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100857" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100858" version="1" comment="libvirt-devel is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100859" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100860" version="1" comment="libvirt-doc is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100861" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100862" version="1" comment="libvirt-python is &lt;1.0.2-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100863" version="1" comment="libpython2_7-1_0 is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100864" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100865" version="1" comment="python-base is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100866" version="1" comment="python-base-32bit is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100867" version="1" comment="python-devel is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100868" version="1" comment="python-xml is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100869" version="1" comment="python-doc is &lt;2.7-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100870" version="1" comment="python-doc-pdf is &lt;2.7-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100871" version="1" comment="python is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100872" version="1" comment="python-32bit is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100873" version="1" comment="python-curses is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100874" version="1" comment="python-demo is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100875" version="1" comment="python-gdbm is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100876" version="1" comment="python-idle is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100877" version="1" comment="python-tk is &lt;2.7.3-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100878" version="1" comment="claws-mail is &lt;3.10.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100879" version="1" comment="claws-mail-devel is &lt;3.10.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100880" version="1" comment="claws-mail-lang is &lt;3.10.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100928" version="1" comment="rsyslog is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100929" version="1" comment="rsyslog-diag-tools is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100930" version="1" comment="rsyslog-doc is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100931" version="1" comment="rsyslog-module-dbi is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100932" version="1" comment="rsyslog-module-elasticsearch is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100933" version="1" comment="rsyslog-module-gssapi is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100934" version="1" comment="rsyslog-module-gtls is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100935" version="1" comment="rsyslog-module-mmnormalize is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100936" version="1" comment="rsyslog-module-mysql is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100937" version="1" comment="rsyslog-module-pgsql is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100938" version="1" comment="rsyslog-module-relp is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100939" version="1" comment="rsyslog-module-snmp is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100940" version="1" comment="rsyslog-module-udpspoof is &lt;7.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101047" version="1" comment="perl-Email-Address is &lt;1.892-11.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100971" version="1" comment="bash is &lt;4.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100972" version="1" comment="bash-devel is &lt;4.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100973" version="1" comment="bash-doc is &lt;4.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100974" version="1" comment="bash-lang is &lt;4.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100975" version="1" comment="bash-loadables is &lt;4.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100976" version="1" comment="libreadline6-32bit is &lt;6.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100977" version="1" comment="libreadline6 is &lt;6.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100978" version="1" comment="readline-devel-32bit is &lt;6.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100979" version="1" comment="readline-devel is &lt;6.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100980" version="1" comment="readline-doc is &lt;6.2-61.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100991" version="1" comment="getmail is &lt;4.46.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100992" version="1" comment="getmail-doc is &lt;4.46.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100993" version="1" comment="wpa_supplicant is &lt;1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100994" version="1" comment="wpa_supplicant-gui is &lt;1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101077" version="1" comment="MozillaFirefox is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101078" version="1" comment="MozillaFirefox-branding-upstream is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101079" version="1" comment="MozillaFirefox-buildsymbols is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101080" version="1" comment="MozillaFirefox-devel is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101081" version="1" comment="MozillaFirefox-translations-common is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101082" version="1" comment="MozillaFirefox-translations-other is &lt;33.0-1.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101083" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101084" version="1" comment="mozilla-nspr is &lt;4.10.7-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101085" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101086" version="1" comment="libfreebl3 is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101087" version="1" comment="libfreebl3-32bit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101088" version="1" comment="libsoftokn3 is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101089" version="1" comment="libsoftokn3-32bit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101090" version="1" comment="mozilla-nss is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101091" version="1" comment="mozilla-nss-32bit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101092" version="1" comment="mozilla-nss-certs is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101093" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101094" version="1" comment="mozilla-nss-devel is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101095" version="1" comment="mozilla-nss-sysinit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101096" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101097" version="1" comment="mozilla-nss-tools is &lt;3.17.1-1.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101098" version="1" comment="seamonkey is &lt;2.30-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101099" version="1" comment="seamonkey-dom-inspector is &lt;2.30-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101100" version="1" comment="seamonkey-irc is &lt;2.30-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101101" version="1" comment="seamonkey-translations-common is &lt;2.30-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101102" version="1" comment="seamonkey-translations-other is &lt;2.30-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101103" version="1" comment="MozillaThunderbird is &lt;31.2.0-61.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101104" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.2.0-61.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101105" version="1" comment="MozillaThunderbird-devel is &lt;31.2.0-61.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101106" version="1" comment="MozillaThunderbird-translations-common is &lt;31.2.0-61.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101107" version="1" comment="MozillaThunderbird-translations-other is &lt;31.2.0-61.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101166" version="1" comment="libzmq4 is &lt;4.0.5-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101167" version="1" comment="zeromq is &lt;4.0.5-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101168" version="1" comment="zeromq-devel is &lt;4.0.5-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101049" version="1" comment="libopenssl-devel is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101050" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101051" version="1" comment="libopenssl1_0_0 is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101052" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101053" version="1" comment="openssl is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101054" version="1" comment="openssl-doc is &lt;1.0.1j-1.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101055" version="1" comment="libxml2-2 is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101056" version="1" comment="libxml2-2-32bit is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101057" version="1" comment="libxml2 is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101058" version="1" comment="libxml2-devel is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101059" version="1" comment="libxml2-devel-32bit is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101060" version="1" comment="libxml2-doc is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101061" version="1" comment="libxml2-tools is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101062" version="1" comment="python-libxml2 is &lt;2.9.0-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101139" version="1" comment="phpMyAdmin is &lt;4.1.14.6-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105191" version="1" comment="gnu-efi is &lt;3.0u-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105192" version="1" comment="pesign is &lt;0.109-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105193" version="1" comment="shim is &lt;0.7.318.81ee561d-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101169" version="1" comment="libpurple-branding-openSUSE is &lt;12.2-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101170" version="1" comment="pidgin-branding-openSUSE is &lt;12.2-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101171" version="1" comment="pidgin-otr is &lt;4.0.0-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101172" version="1" comment="finch is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101173" version="1" comment="finch-devel is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101174" version="1" comment="libpurple is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101175" version="1" comment="libpurple-branding-upstream is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101176" version="1" comment="libpurple-devel is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101177" version="1" comment="libpurple-lang is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101178" version="1" comment="libpurple-meanwhile is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101179" version="1" comment="libpurple-tcl is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101180" version="1" comment="pidgin is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101181" version="1" comment="pidgin-devel is &lt;2.10.10-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101182" version="1" comment="apache2-mod_php5 is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101183" version="1" comment="php5 is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101184" version="1" comment="php5-bcmath is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101185" version="1" comment="php5-bz2 is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101186" version="1" comment="php5-calendar is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101187" version="1" comment="php5-ctype is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101188" version="1" comment="php5-curl is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101189" version="1" comment="php5-dba is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101190" version="1" comment="php5-devel is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101191" version="1" comment="php5-dom is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101192" version="1" comment="php5-enchant is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101193" version="1" comment="php5-exif is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101194" version="1" comment="php5-fastcgi is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101195" version="1" comment="php5-fileinfo is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101196" version="1" comment="php5-fpm is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101197" version="1" comment="php5-ftp is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101198" version="1" comment="php5-gd is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101199" version="1" comment="php5-gettext is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101200" version="1" comment="php5-gmp is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101201" version="1" comment="php5-iconv is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101202" version="1" comment="php5-imap is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101203" version="1" comment="php5-intl is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101204" version="1" comment="php5-json is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101205" version="1" comment="php5-ldap is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101206" version="1" comment="php5-mbstring is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101207" version="1" comment="php5-mcrypt is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101208" version="1" comment="php5-mssql is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101209" version="1" comment="php5-mysql is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101210" version="1" comment="php5-odbc is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101211" version="1" comment="php5-openssl is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101212" version="1" comment="php5-pcntl is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101213" version="1" comment="php5-pdo is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101214" version="1" comment="php5-pear is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101215" version="1" comment="php5-pgsql is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101216" version="1" comment="php5-phar is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101217" version="1" comment="php5-posix is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101218" version="1" comment="php5-pspell is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101219" version="1" comment="php5-readline is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101220" version="1" comment="php5-shmop is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101221" version="1" comment="php5-snmp is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101222" version="1" comment="php5-soap is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101223" version="1" comment="php5-sockets is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101224" version="1" comment="php5-sqlite is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101225" version="1" comment="php5-suhosin is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101226" version="1" comment="php5-sysvmsg is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101227" version="1" comment="php5-sysvsem is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101228" version="1" comment="php5-sysvshm is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101229" version="1" comment="php5-tidy is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101230" version="1" comment="php5-tokenizer is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101231" version="1" comment="php5-wddx is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101232" version="1" comment="php5-xmlreader is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101233" version="1" comment="php5-xmlrpc is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101234" version="1" comment="php5-xmlwriter is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101235" version="1" comment="php5-xsl is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101236" version="1" comment="php5-zip is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101237" version="1" comment="php5-zlib is &lt;5.3.17-3.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101334" version="1" comment="libserf-1-0 is &lt;1.1.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101335" version="1" comment="libserf is &lt;1.1.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101336" version="1" comment="libserf-devel is &lt;1.1.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101238" version="1" comment="quassel is &lt;0.8.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101239" version="1" comment="quassel-base is &lt;0.8.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101240" version="1" comment="quassel-client is &lt;0.8.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101241" version="1" comment="quassel-core is &lt;0.8.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101242" version="1" comment="quassel-mono is &lt;0.8.0-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101243" version="1" comment="wget is &lt;1.16-15.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101337" version="1" comment="ImageMagick is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101338" version="1" comment="ImageMagick-devel-32bit is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101339" version="1" comment="ImageMagick-devel is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101340" version="1" comment="ImageMagick-doc is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101341" version="1" comment="ImageMagick-extra is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101342" version="1" comment="libMagick++-devel is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101343" version="1" comment="libMagick++5 is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101344" version="1" comment="libMagickCore5-32bit is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101345" version="1" comment="libMagickCore5 is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101346" version="1" comment="libMagickWand5-32bit is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101347" version="1" comment="libMagickWand5 is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101348" version="1" comment="perl-PerlMagick is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101916" version="1" comment="libvirt is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101917" version="1" comment="libvirt-client is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101918" version="1" comment="libvirt-client-32bit is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101919" version="1" comment="libvirt-devel is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101920" version="1" comment="libvirt-devel-32bit is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101921" version="1" comment="libvirt-doc is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101922" version="1" comment="libvirt-lock-sanlock is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101923" version="1" comment="libvirt-python is &lt;1.0.2-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101880" version="1" comment="dbus-1-x11 is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101881" version="1" comment="dbus-1 is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101882" version="1" comment="dbus-1-32bit is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101883" version="1" comment="dbus-1-devel is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101884" version="1" comment="dbus-1-devel-32bit is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101885" version="1" comment="dbus-1-devel-doc is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101886" version="1" comment="libdbus-1-3 is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101887" version="1" comment="libdbus-1-3-32bit is &lt;1.6.26-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102017" version="1" comment="libopenssl-devel is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102018" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102019" version="1" comment="libopenssl1_0_0 is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102020" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102021" version="1" comment="openssl is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102022" version="1" comment="openssl-doc is &lt;1.0.1j-1.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101924" version="1" comment="gnutls is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101925" version="1" comment="libgnutls-devel is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101926" version="1" comment="libgnutls-devel-32bit is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101927" version="1" comment="libgnutls-openssl-devel is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101928" version="1" comment="libgnutls-openssl27 is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101929" version="1" comment="libgnutls28 is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101930" version="1" comment="libgnutls28-32bit is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101931" version="1" comment="libgnutlsxx-devel is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101932" version="1" comment="libgnutlsxx28 is &lt;3.0.28-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102080" version="1" comment="rubygem-sprockets-2_2 is &lt;2.2.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102081" version="1" comment="rubygem-sprockets-2_2-doc is &lt;2.2.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102082" version="1" comment="rubygem-sprockets-2_1 is &lt;2.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102083" version="1" comment="rubygem-sprockets-2_1-doc is &lt;2.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102084" version="1" comment="wireshark is &lt;1.10.11-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102085" version="1" comment="wireshark-devel is &lt;1.10.11-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102037" version="1" comment="ImageMagick is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102038" version="1" comment="ImageMagick-devel-32bit is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102039" version="1" comment="ImageMagick-devel is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102040" version="1" comment="ImageMagick-doc is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102041" version="1" comment="ImageMagick-extra is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102042" version="1" comment="libMagick++-devel is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102043" version="1" comment="libMagick++5 is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102044" version="1" comment="libMagickCore5-32bit is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102045" version="1" comment="libMagickCore5 is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102046" version="1" comment="libMagickWand5-32bit is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102047" version="1" comment="libMagickWand5 is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102048" version="1" comment="perl-PerlMagick is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102100" version="1" comment="rubygem-sprockets is &lt;2.8.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102101" version="1" comment="rubygem-sprockets-doc is &lt;2.8.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102102" version="1" comment="file is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102103" version="1" comment="file-devel is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102104" version="1" comment="libmagic-data is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102105" version="1" comment="libmagic1-32bit is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102106" version="1" comment="libmagic1 is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102107" version="1" comment="python-magic is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102494" version="1" comment="clamav is &lt;0.98.5-5.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102108" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102109" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.12-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102495" version="1" comment="phpMyAdmin is &lt;4.1.14.7-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102571" version="1" comment="apache2-mod_wsgi is &lt;3.3-12.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102572" version="1" comment="icecast is &lt;2.3.2-72.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102573" version="1" comment="flac is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102574" version="1" comment="flac-devel is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102575" version="1" comment="flac-devel-32bit is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102576" version="1" comment="libFLAC++6 is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102577" version="1" comment="libFLAC++6-32bit is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102578" version="1" comment="libFLAC8 is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102579" version="1" comment="libFLAC8-32bit is &lt;1.2.1_git201212051942-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102580" version="1" comment="ruby19 is &lt;1.9.3.p392-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102581" version="1" comment="ruby19-devel is &lt;1.9.3.p392-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102582" version="1" comment="ruby19-devel-extra is &lt;1.9.3.p392-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102583" version="1" comment="ruby19-doc-ri is &lt;1.9.3.p392-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102584" version="1" comment="ruby19-tk is &lt;1.9.3.p392-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102585" version="1" comment="openvpn is &lt;2.2.2-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102586" version="1" comment="openvpn-auth-pam-plugin is &lt;2.2.2-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102587" version="1" comment="openvpn-down-root-plugin is &lt;2.2.2-9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102728" version="1" comment="apache2 is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102729" version="1" comment="apache2-devel is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102730" version="1" comment="apache2-doc is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102731" version="1" comment="apache2-event is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102732" version="1" comment="apache2-example-pages is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102733" version="1" comment="apache2-itk is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102734" version="1" comment="apache2-prefork is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102735" version="1" comment="apache2-utils is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102736" version="1" comment="apache2-worker is &lt;2.2.29-10.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102737" version="1" comment="cpio is &lt;2.11-21.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102738" version="1" comment="cpio-lang is &lt;2.11-21.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102700" version="1" comment="libyaml-0-2 is &lt;0.1.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102701" version="1" comment="libyaml is &lt;0.1.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102702" version="1" comment="libyaml-devel is &lt;0.1.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102739" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102740" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102741" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102742" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102743" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102744" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102745" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.55-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102508" version="1" comment="MozillaFirefox is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102509" version="1" comment="MozillaFirefox-branding-upstream is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102510" version="1" comment="MozillaFirefox-buildsymbols is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102511" version="1" comment="MozillaFirefox-devel is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102512" version="1" comment="MozillaFirefox-translations-common is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102513" version="1" comment="MozillaFirefox-translations-other is &lt;34.0.5-1.94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102514" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102515" version="1" comment="mozilla-nspr is &lt;4.10.7-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102516" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102517" version="1" comment="libfreebl3 is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102518" version="1" comment="libfreebl3-32bit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102519" version="1" comment="libsoftokn3 is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102520" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102521" version="1" comment="mozilla-nss is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102522" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102523" version="1" comment="mozilla-nss-certs is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102524" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102525" version="1" comment="mozilla-nss-devel is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102526" version="1" comment="mozilla-nss-sysinit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102527" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102528" version="1" comment="mozilla-nss-tools is &lt;3.17.2-1.63.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102901" version="1" comment="MozillaThunderbird is &lt;31.3.0-61.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102902" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.3.0-61.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102903" version="1" comment="MozillaThunderbird-devel is &lt;31.3.0-61.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102904" version="1" comment="MozillaThunderbird-translations-common is &lt;31.3.0-61.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102905" version="1" comment="MozillaThunderbird-translations-other is &lt;31.3.0-61.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102746" version="1" comment="libjpeg-turbo is &lt;1.2.1-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102747" version="1" comment="libjpeg8-32bit is &lt;8.0.2-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102748" version="1" comment="libjpeg8 is &lt;8.0.2-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102749" version="1" comment="libjpeg8-devel-32bit is &lt;8.0.2-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102750" version="1" comment="libjpeg8-devel is &lt;8.0.2-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102751" version="1" comment="libjpeg62-32bit is &lt;62.0.0-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102752" version="1" comment="libjpeg62 is &lt;62.0.0-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102753" version="1" comment="libjpeg62-devel-32bit is &lt;62.0.0-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102754" version="1" comment="libjpeg62-devel is &lt;62.0.0-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102755" version="1" comment="libjpeg62-turbo is &lt;1.2.1-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102756" version="1" comment="phpMyAdmin is &lt;4.1.14.8-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102757" version="1" comment="lua-rrdtool is &lt;1.4.7-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102758" version="1" comment="python-rrdtool is &lt;1.4.7-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102759" version="1" comment="rrdtool is &lt;1.4.7-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102760" version="1" comment="rrdtool-devel is &lt;1.4.7-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102761" version="1" comment="tcl-rrdtool is &lt;1.4.7-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102762" version="1" comment="mutt is &lt;1.5.21-36.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102763" version="1" comment="firebird-classic is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102764" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102765" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102766" version="1" comment="firebird is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102767" version="1" comment="firebird-32bit is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102768" version="1" comment="firebird-devel is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102769" version="1" comment="firebird-doc is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102770" version="1" comment="firebird-superserver is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102771" version="1" comment="libfbclient2 is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102772" version="1" comment="libfbclient2-32bit is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102773" version="1" comment="libfbclient2-devel is &lt;2.5.2.26539-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102774" version="1" comment="jasper is &lt;1.900.1-156.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102775" version="1" comment="libjasper-devel is &lt;1.900.1-156.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102776" version="1" comment="libjasper1 is &lt;1.900.1-156.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102777" version="1" comment="libjasper1-32bit is &lt;1.900.1-156.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102906" version="1" comment="seamonkey is &lt;2.31-1.65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102907" version="1" comment="seamonkey-dom-inspector is &lt;2.31-1.65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102908" version="1" comment="seamonkey-irc is &lt;2.31-1.65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102909" version="1" comment="seamonkey-translations-common is &lt;2.31-1.65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102910" version="1" comment="seamonkey-translations-other is &lt;2.31-1.65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103109" version="1" comment="pdns-recursor is &lt;3.6.2-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103110" version="1" comment="libksba is &lt;1.3.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103111" version="1" comment="libksba-devel is &lt;1.3.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103112" version="1" comment="libksba8 is &lt;1.3.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103200" version="1" comment="mailx is &lt;12.5-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102941" version="1" comment="kernel-debug is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102942" version="1" comment="kernel-debug-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102943" version="1" comment="kernel-debug-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102944" version="1" comment="kernel-default is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102945" version="1" comment="kernel-default-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102946" version="1" comment="kernel-default-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102947" version="1" comment="kernel-desktop is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102948" version="1" comment="kernel-desktop-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102949" version="1" comment="kernel-desktop-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102950" version="1" comment="kernel-docs is &lt;3.7.10-1.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102951" version="1" comment="kernel-ec2 is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102952" version="1" comment="kernel-ec2-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102953" version="1" comment="kernel-ec2-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102954" version="1" comment="kernel-pae is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102955" version="1" comment="kernel-pae-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102956" version="1" comment="kernel-pae-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102957" version="1" comment="kernel-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102958" version="1" comment="kernel-source is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102959" version="1" comment="kernel-source-vanilla is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102960" version="1" comment="kernel-syms is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102961" version="1" comment="kernel-trace is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102962" version="1" comment="kernel-trace-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102963" version="1" comment="kernel-trace-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102964" version="1" comment="kernel-vanilla is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102965" version="1" comment="kernel-vanilla-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102966" version="1" comment="kernel-xen is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102967" version="1" comment="kernel-xen-base is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102968" version="1" comment="kernel-xen-devel is &lt;3.7.10-1.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103201" version="1" comment="xorg-x11-server is &lt;7.6_1.13.2-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103202" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.13.2-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103203" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.13.2-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103204" version="1" comment="python3-rpm is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103205" version="1" comment="rpm-python is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103206" version="1" comment="rpm-32bit is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103207" version="1" comment="rpm is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103208" version="1" comment="rpm-build is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103209" version="1" comment="rpm-devel is &lt;4.10.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103245" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103246" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103247" version="1" comment="subversion is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103248" version="1" comment="subversion-bash-completion is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103249" version="1" comment="subversion-devel is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103250" version="1" comment="subversion-perl is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103251" version="1" comment="subversion-python is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103252" version="1" comment="subversion-server is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103253" version="1" comment="subversion-tools is &lt;1.7.19-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102969" version="1" comment="ntp is &lt;4.2.6p5-9.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102970" version="1" comment="ntp-doc is &lt;4.2.6p5-9.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103254" version="1" comment="apache2 is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103255" version="1" comment="apache2-devel is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103256" version="1" comment="apache2-doc is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103257" version="1" comment="apache2-event is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103258" version="1" comment="apache2-example-pages is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103259" version="1" comment="apache2-itk is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103260" version="1" comment="apache2-prefork is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103261" version="1" comment="apache2-utils is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103262" version="1" comment="apache2-worker is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105046" version="1" comment="libssh is &lt;0.5.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105047" version="1" comment="libssh-devel is &lt;0.5.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105048" version="1" comment="libssh-devel-doc is &lt;0.5.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105049" version="1" comment="libssh4 is &lt;0.5.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105095" version="1" comment="jasper is &lt;1.900.1-156.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105096" version="1" comment="libjasper-devel is &lt;1.900.1-156.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105097" version="1" comment="libjasper1 is &lt;1.900.1-156.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105098" version="1" comment="libjasper1-32bit is &lt;1.900.1-156.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105683" version="1" comment="glibc-testsuite is &lt;2.17-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105684" version="1" comment="glibc-utils is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105685" version="1" comment="glibc-utils-32bit is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105686" version="1" comment="glibc is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105687" version="1" comment="glibc-devel is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105688" version="1" comment="glibc-devel-static is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105689" version="1" comment="glibc-extra is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105690" version="1" comment="glibc-html is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105691" version="1" comment="glibc-i18ndata is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105692" version="1" comment="glibc-info is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105693" version="1" comment="glibc-locale is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105694" version="1" comment="glibc-obsolete is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105695" version="1" comment="glibc-profile is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105696" version="1" comment="nscd is &lt;2.17-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044469"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-superserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-js</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-js-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitPlugin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-venkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-volume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-novncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-objectstore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-vncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-volume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-quantum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-quantum-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-quantum-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-quantum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-quickstart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-account</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-object</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinderclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinderclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinderclient-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-django_openstack_auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enigmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typo3-cms-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typo3-cms-4_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typo3-cms-4_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-pam-ldapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-pam-ldapd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble-xmpp-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>almanah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>almanah-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby19-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fail2ban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lwresd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-itk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql92-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libIndirectGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libIndirectGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libIndirectGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libIndirectGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r300-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r300</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_softpipe-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_softpipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_softpipe-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_softpipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xevie0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xevie0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xprint0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xprint0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libautotrace3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>darktable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>darktable-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-greenlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-greenlet-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www-dch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-ffmpegsumo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-suid-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Signature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-suds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagstamon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-liboxygenstyle-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-liboxygenstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-plasma-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-kdebase4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>srtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>srtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-itsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-debug-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-debug-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glanceclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glanceclient-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>filezilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>filezilla-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>putty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_3m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_3m1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_chrono1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_timer1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_49_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-obsolete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-analyze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-analyze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GUdev-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clutter-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclutter-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclutter-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Clutter-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SpiceClientGtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zenmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzrtpcpp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dropbear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_fcgid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvarnishapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodules-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodules-tigrigna-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-svg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>horde5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ca-certificates-mozilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_geoip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openttd-dedicated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libv8-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webyast-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webyast-base-branding-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webyast-base-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-idoutils-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-plugins-downtimes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-plugins-eventhandlers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monitoring-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-gtk-greeter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-gtk-greeter-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-gtk-greeter-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnumeric-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler34</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bot-sentry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-bot-sentry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-bot-sentry-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-advanced-sound-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-advanced-sound-notification-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-advanced-sound-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-birthday-reminder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-birthday-reminder-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-birthday-reminder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-embeddedvideo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-embeddedvideo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-facebookchat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-facebookchat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-guifications</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-guifications-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-guifications</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-mrim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-mrim-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-mrim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-openfetion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-openfetion-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-openfetion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-sipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-sipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-plugin-sipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-pack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-pack-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-pack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-pack-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>purple-plugin-pack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>purple-plugin-pack-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-skype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-skype-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-skype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skype4pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-haze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-dialupadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear-Net_IDNA2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>percona-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-UDisks-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Body</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-ssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>couchdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti-spine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nrpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-eyeD3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>android-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfixadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-capng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ninja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uucp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>castor-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-xsltc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eet-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eet-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eet-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeet1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jbigkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IPython-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-IPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-crystal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-hicontrast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-oxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be-BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-loadables</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Email-Address</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>getmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>getmail-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcl-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6p3-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.0.2-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4-1.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.7-4.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.1-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.16.2-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.7-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1362502414.95a620b-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1362503968.8ece3c7-2.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363297737.dd849a9-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1362502288.8690166-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363297910.9561484-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1362583635.f94b149-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2+git.1360262230.cb0fbe8-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4.1+git.1359529903.0ce3e1d-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1.5.g82e47d0+git.1355912775.82e47d0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4-61.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.4-61.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.25-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.18-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.10-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.10-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.17.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.21-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.8.8-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.17-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.7-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363796849.255b1d4-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3-15.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-1.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.28-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.2P2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5.P1-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.22-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.6-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.0-1.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.5-61.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.5-61.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.5-1.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.2.4-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.9-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-1.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.2-34.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.0-34.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-34.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-8.14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.13.2-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.6-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.14-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.08-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.8-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363796849.255b1d4-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-59.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-59.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.0-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.6-61.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.6-61.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.6-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.17.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.10-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31.1-637.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8.1-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.7-3.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.7-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363297910.9561484-2.10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363297910.9561484-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4.1+git.1359529903.0ce3e1d-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.2.4+git.1363796849.255b1d4-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1.3.gd37a3fb+git.1357543650.d37a3fb-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-14.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.0-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1+17.0.7-61.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.13.2-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:30.0.1553.0-1.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.73-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.2-34.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.0-34.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-34.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.5-1.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.11-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.35-2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.9-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.22-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.18-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-26.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.32-1.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0.14.gc057fe4+git.1355912586.c057fe4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-59.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.15.0-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:23.0-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8-61.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2+17.0.8-61.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.3P2-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.3-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.63-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8b-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3-15.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_k3.7.10_1.16-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.13-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0-61.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2+24.0-61.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.21-1.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.49.0-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:195-13.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.2-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:30.0.1599.66-1.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4d-4.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.25-3.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-114.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.60-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.13.2-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.11-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-8.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_01-1.22.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_01_k3.7.10_1.16-1.22.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0-1.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.1.0-61.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.1.0-61.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.1-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10-1.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-9.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-1.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.11-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0.1650.57-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3-1.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.36.4-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.14-2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.12-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25b-195.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0.1650.63-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:26.0-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.2.0-61.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.2.0-61.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.31-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.23-1.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22.24.8-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.43.1-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.13.2-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.4-3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.4-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.08-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.0-2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.11-2.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-8.32.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3.25-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.1-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.69-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.28-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-4.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1.rev624-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:27.0-1.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3.0-61.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.3.0-61.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.4-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-1.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:32.0.1700.102-1.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-21.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.16-2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.58.0-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:33.0.1750.117-1.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-1.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_k3.7.10_1.28-1.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.8-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.2.7-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.12-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.28-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.11-12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.5-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.20-26.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-26.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.11-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.8.8-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.13-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-36.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.11-12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.35-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:28.0-1.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.4-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.5-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.11-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:33.0.1750.152-1.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.4.0-61.43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.4.0-61.43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-1.41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.0-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-1353.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-163.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-114.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.21-26.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-26.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1e-1.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-13.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-1.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:34.0.1847.116-1.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8b-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8b-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-1.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.13-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:29.0-1.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.5.0-61.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.5.0-61.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-1.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.18-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1_r1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-1.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:34.0.1847.132-1.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.03-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-21.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4.22-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.6-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:35.0.1916.114-1.45.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0+git.20130603.0f53fd3-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.28-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1h-1.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.3-85.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.5-85.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.07-85.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.34-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:30.0-1.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.6-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-1.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.6.0-61.51.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0+24.6.0-61.51.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.5-317.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-1.53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-259.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-59.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.19-5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-10.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-10.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.06-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-1.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.3-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.7.0-61.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.83-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:36.0.1985.125-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.155-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4.23-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.22-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-10.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-10.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.18-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.3-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3.2.4-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3.2.4-2.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.1.0-1.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-1.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.1.0-61.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:37.0.2062.94-1.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-260.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.11-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.15-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.28.1-4.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.24-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.10-1.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_k3.7.10_1.40-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-61.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-61.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-1.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-61.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-61.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.5-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.7-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.892-11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-61.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-61.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.46.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:33.0-1.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.1-1.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.2.0-61.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-2.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1j-1.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.6-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0u-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.109-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2-4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.10-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-3.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-15.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.8.8-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.26-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1j-1.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.28-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.11-1.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.8.8-4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.11-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.5-5.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.7-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3-12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-72.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1_git201212051942-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.3.p392-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.29-10.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-21.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.55-8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:34.0.5-1.94.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-1.63.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0-61.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-19.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-19.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.0.0-19.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.14.8-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-36.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-156.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31-1.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.10-1.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.13.2-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.19-2.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.29-10.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-156.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-4.17.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
